CVE-2021-42296

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through specially crafted Microsoft Word documents. Attackers can exploit this by tricking users into opening malicious files, potentially gaining control of affected systems. All users running vulnerable versions of Microsoft Word are affected.

💻 Affected Systems

Products:
  • Microsoft Word
  • Microsoft Office
Versions: Microsoft Word 2016, 2019, and Microsoft 365 Apps prior to October 2021 updates
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both 32-bit and 64-bit versions. Microsoft 365 Apps for Enterprise are affected if not updated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control, data exfiltration, lateral movement, and persistence establishment.

🟠

Likely Case

Local user account compromise leading to data theft, ransomware deployment, or credential harvesting.

🟢

If Mitigated

Limited impact with proper email filtering, user training, and application sandboxing preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious document. Exploit chains with other vulnerabilities may increase effectiveness.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2021 Security Update or later

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42296

Restart Required: Yes

Instructions:

1. Open Microsoft Word. 2. Go to File > Account > Update Options > Update Now. 3. Restart computer after update completes. 4. Verify update installed via File > Account > About Word.

🔧 Temporary Workarounds

Block Office macros from the Internet

windows

Prevents execution of macros in documents from untrusted sources

Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Office\16.0\Word\Security" -Name "BlockContentExecutionFromInternet" -Value 1 -Type DWord

Enable Protected View for all documents

windows

Forces documents to open in sandboxed Protected View mode

Set-ItemProperty -Path "HKCU:\Software\Microsoft\Office\16.0\Word\Security\ProtectedView" -Name "DisableInternetFilesInPV" -Value 0 -Type DWord

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized Word execution
  • Deploy email filtering to block malicious attachments and enable macro blocking

🔍 How to Verify

Check if Vulnerable:

Check Word version via File > Account > About Word. If version is older than October 2021 updates, system is vulnerable.

Check Version:

powershell "Get-ItemProperty 'HKLM:\SOFTWARE\Microsoft\Office\ClickToRun\Configuration' | Select-Object VersionToReport"

Verify Fix Applied:

Verify Word version is 16.0.14326.20404 or later via File > Account > About Word.

📡 Detection & Monitoring

Log Indicators:

  • Word process spawning unexpected child processes
  • Suspicious PowerShell or cmd.exe execution from Word context
  • Multiple failed document opening attempts

Network Indicators:

  • Outbound connections from Word process to unknown IPs
  • DNS queries for command and control domains from Office processes

SIEM Query:

process_name:"WINWORD.EXE" AND (child_process_name:"powershell.exe" OR child_process_name:"cmd.exe")

🔗 References

📤 Share & Export