7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.971 High
EPSS
Percentile
99.7%
Microsoft MSHTML Remote Code Execution Vulnerability
Recent assessments:
JunquerGJ at September 07, 2021 10:50pm UTC reported:
Vulnerable if default behaviour has been changed ( By default, Microsoft Office opens documents from the internet in Protected View or Application Guard for Office both of which prevent the current attack )
Requires social engineering to be exploited
Workaround easy to deploy
ccondon-r7 at September 07, 2021 7:12pm UTC reported:
Vulnerable if default behaviour has been changed ( By default, Microsoft Office opens documents from the internet in Protected View or Application Guard for Office both of which prevent the current attack )
Requires social engineering to be exploited
Workaround easy to deploy
nu11secur1ty at September 22, 2021 4:28pm UTC reported:
Vulnerable if default behaviour has been changed ( By default, Microsoft Office opens documents from the internet in Protected View or Application Guard for Office both of which prevent the current attack )
Requires social engineering to be exploited
Workaround easy to deploy
NinjaOperator at September 07, 2021 6:45pm UTC reported:
Vulnerable if default behaviour has been changed ( By default, Microsoft Office opens documents from the internet in Protected View or Application Guard for Office both of which prevent the current attack )
Requires social engineering to be exploited
Workaround easy to deploy
Assessed Attacker Value: 3
Assessed Attacker Value: 3Assessed Attacker Value: 2
packetstormsecurity.com/files/164210/Microsoft-Windows-MSHTML-Overview.html
packetstormsecurity.com/files/165214/Microsoft-Office-Word-MSHTML-Remote-Code-Execution.html
packetstormsecurity.com/files/167317/Microsoft-Office-MSDT-Follina-Proof-Of-Concept.html
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40444
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40444
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.971 High
EPSS
Percentile
99.7%