Open Nav
Sign Up

Microsoft Patches Critical Windows and Office Vulnerabilities Exploited in Attacks (CVE-2024-21413, CVE-2024-21412 and CVE-2024-21351)

Bar Refael

February 14, 2024

Microsoft has released a significant batch of security updates addressing 72 vulnerabilities in the Windows ecosystem, with a focus on three specific vulnerabilities that have been exploited in live malware attacks. These include a remote code execution bug in Microsoft Office (CVE-2024-21413) and two security feature bypass bugs in Windows (CVE-2024-21412 and CVE-2024-21351).

Details:

  • CVE-2024-21413: This vulnerability in Microsoft Office could be exploited via the software’s Preview Pane security mitigation, allowing an attacker to bypass Office Protected View and open a document in editing mode rather than protected mode. The flaw has a CVSS severity score of 9.8 out of 10.
  • CVE-2024-21412 and CVE-2024-21351: These security feature bypass vulnerabilities in Windows have been exploited in malware attacks. Cybercriminals are launching phishing and spoofing attacks that bypass the operating system’s security protections.

One of the exploited bugs, CVE-2021-43890, dates back to 2021 and is associated with malware families such as Emotet/Trickbot/Bazaloader. Microsoft Threat Intelligence has observed an increase in activity from threat actors leveraging social engineering and phishing techniques to target Windows OS users.

Impact:

Successful exploitation of these vulnerabilities could lead to remote code execution, security feature bypass, information disclosure, and privilege escalation attacks. Users are at risk of falling victim to malware attacks that bypass the operating system’s security measures.

Mitigation:

Microsoft urges Windows administrators to promptly apply the security updates to protect against potential exploitation. Users should also exercise caution when clicking on links from unknown sources and be vigilant about security warnings.

Stay safe and informed,

OP Innovate.

Resources highlights

BlueHammer: Microsoft Defender Privilege Escalation (CVE-2026-33825)

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-33825, also known as BlueHammer, to its Known Exploited Vulnerabilities (KEV) Catalog, confirming active exploitation…

Read more >

CVE-2026-33825

CISA Flags Actively Exploited Cisco SD-WAN Vulnerabilities (CVE-2026-20133, CVE-2026-20122, CVE-2026-20128)

CISA has added multiple Cisco Catalyst SD-WAN vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, indicating active exploitation in the wild. These flaws affect SD-WAN…

Read more >

cisco sd-wan

Cyber Warfare Amid the Israel-Iran Conflict: What Organizations Need to Know

Launched in late February, the joint U.S.-Israeli airstrike campaign against Iran (codenamed Operation Epic Fury/Roaring Lion) was quickly met with retaliatory cyberattacks. Iran’s hackers wasted…

Read more >

Iran cyber activity

nginx-ui Unauthenticated Takeover Vulnerability Actively Exploited (CVE-2026-33032)

CVE-2026-33032 is a critical authentication bypass vulnerability affecting nginx-ui (≤ 2.3.5). The issue arises from inconsistent security controls applied to MCP endpoints: while the /mcp…

Read more >

CVE-2026-33032

CISA Flags Actively Exploited Microsoft Office and SharePoint Vulnerabilities (CVE-2009-0238, CVE-2026-32201)

CISA has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, confirming active exploitation in the wild. The inclusion of both a legacy Microsoft…

Read more >

CVE-2009-0238, CVE-2026-32201

Ivanti EPMM Unauthenticated RCE Actively Exploited (CVE-2026-1340)

CVE-2026-1340 is a critical code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) that enables unauthenticated remote code execution (RCE). The flaw has been confirmed…

Read more >

CVE-2026-1340
Under Cyber Attack?

Fill out the form and we will contact you immediately.