What is it? It’s (yet another) zero day attack that is a TARGETED only attack using Office and RTF file to take ownership of your machine. Microsoft
[See the full post at: Zero day CVE 2021-40444]
Susan Bradley Patch Lady/Prudent patcher
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
Home » Forums » Newsletter and Homepage topics » Zero day CVE 2021-40444
Tags: Patch Lady Posts
What is it? It’s (yet another) zero day attack that is a TARGETED only attack using Office and RTF file to take ownership of your machine. Microsoft
[See the full post at: Zero day CVE 2021-40444]
Susan Bradley Patch Lady/Prudent patcher
For Pro/Edu/Ent editions, you can opt to adjust ActiveX controls via Group Policy to all zones, which is Microsoft’s recommended method.
In Group Policy settings, navigate to Computer Configuration > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page
For each zone:
Select the zone (Internet Zone, Intranet Zone, Local Machine Zone, or Trusted Sites Zone).
Double-click Download signed ActiveX controls and Enable the policy. Then set the option in the policy to Disable.
Double-click Download unsigned ActiveX controls and Enable the policy. Then set the option in the policy to Disable.
We recommend applying this setting to all zones to fully protect your system.
Impact of workaround.
This sets the URLACTION_DOWNLOAD_SIGNED_ACTIVEX (0x1001) and URLACTION_DOWNLOAD_UNSIGNED_ACTIVEX (0x1004) to DISABLED (3) for all internet zones for 64-bit and 32-bit processes. New ActiveX controls will not be installed. Previously-installed ActiveX controls will continue to run.
How to undo the workaround
Set the option in the policy to Enable.
Source: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444
We know not to turn on preview pane in Outlook.
I would hazard a guess that most Outlook users have the preview pane enabled.
But isn’t it relevant that most Office users also have the default Protected View?
Mitigations
By default, Microsoft Office opens documents from the internet in Protected View or Application Guard for Office both of which prevent the current attack. For information about Protected View, see What is Protected View?.
Microsoft patched this vulnerability 09/14 for most flavors of OS Server and Workstations.
In our Windows 10 1909, Server 2012 R2, and Server 2016 test group IE11 will not start after applying the respective patches. When IE11 is launched a white screen without any text or controls appears on the screen. Nothing logged indicating something has been blocked. The patches are:
Win10 1909 Sep Cumulative 5005566
Server 2012 R2 Sep Security Only KB5005627 and IE Cumulative KB5005563
Server 2016 Sep Cumulative KB5005573
Appreciate feedback if anyone else has seen this.
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.