CVE-2022-21842

7.8 HIGH

📋 TL;DR

CVE-2022-21842 is a remote code execution vulnerability in Microsoft Word that allows attackers to execute arbitrary code by tricking users into opening specially crafted documents. This affects users of Microsoft Word on Windows systems. Successful exploitation requires user interaction but can lead to full system compromise.

💻 Affected Systems

Products:
  • Microsoft Word
  • Microsoft Office
Versions: Microsoft Office 2019, Microsoft Office LTSC 2021, Microsoft 365 Apps for Enterprise
Operating Systems: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both 32-bit and 64-bit versions. Microsoft 365 Apps are automatically updated when patches are available.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining the same privileges as the logged-in user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malware installation, credential theft, or data exfiltration through malicious documents delivered via phishing or compromised websites.

🟢

If Mitigated

Limited impact with proper email filtering, user training, and application sandboxing preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious document. No public proof-of-concept has been released as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: January 2022 security updates

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21842

Restart Required: Yes

Instructions:

1. Open Microsoft Word. 2. Go to File > Account > Update Options > Update Now. 3. Alternatively, use Windows Update for system-wide Office updates. 4. Restart affected systems after patching.

🔧 Temporary Workarounds

Block RTF documents

windows

Prevent Word from opening RTF documents which may be used in exploitation

reg add "HKCU\Software\Microsoft\Office\16.0\Word\Security" /v "FileBlock\RtfFiles" /t REG_DWORD /d 2 /f

Enable Protected View

windows

Force documents from the internet to open in Protected View

Set-ItemProperty -Path "HKCU:\Software\Microsoft\Office\16.0\Word\Security\ProtectedView" -Name "DisableInternetFilesInPV" -Value 0

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized Word execution
  • Deploy email filtering to block suspicious attachments and enable macro blocking

🔍 How to Verify

Check if Vulnerable:

Check Word version via File > Account > About Word. Vulnerable versions include builds before January 2022 updates.

Check Version:

powershell Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | Where-Object {$_.DisplayName -like "*Microsoft Office*"} | Select-Object DisplayName, DisplayVersion

Verify Fix Applied:

Verify Word version shows build number 14931.20132 or later for Microsoft 365, or verify January 2022 security updates are installed via Windows Update history.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing Word crashes with suspicious parameters
  • Antivirus alerts for malicious Office documents
  • Process creation logs showing unexpected child processes from WINWORD.EXE

Network Indicators:

  • Outbound connections from Word to suspicious IPs
  • DNS queries for command and control domains following document opening

SIEM Query:

source="windows" event_id=1 (process_name="WINWORD.EXE" AND (command_line="*\"*" OR parent_process!="explorer.exe"))

🔗 References

📤 Share & Export