ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Critical Microsoft Office Flaw Patched

b2ap3_thumbnail_Microsoft-Office-icon_400.jpg‘Tis the season for technology vulnerabilities and exploits. In addition to Sandworm and Cryptowall 2.0, another flaw has been found in Microsoft Office. This particular threat allows a hacker to gain control of a computer system, making it a dangerous and potentially threatening gamble for your business to ignore it. Thankfully, the issue has been patched, and the fix is now available to the public.

Microsoft issued a security advisory on October 21st stating that the vulnerability, which allows remote code execution, is found in all supported versions of Microsoft Windows, excluding Windows Server 2003. The threat is triggered by opening an infected Microsoft Office file which contains an OLE (Object Linking and Embedding) object. If the hacker is successful, they can potentially gain the same user rights as other users on the PC, making it a very dangerous vulnerability indeed. If hackers are able to access the system, they can delete data, install malware, or other malicious activity.

The patch for this vulnerability was issued earlier this November, so if you still haven’t patched your systems from this threat, it’s important that you do so as soon as possible.

Thankfully, the vulnerability requires security permission from whoever has the administrative privileges on your business’s PCs. This means that if you were to download an Office file from the web, a window will appear asking if you are sure you want to download it. An example of Object Linking and Embedding (OLE) is embedding an Excel spreadsheet in a Word document.

combining files

Officially, Microsoft says that any Office file utilizing an OLE object is vulnerable to being infected with this threat. Here are some tips you can use to protect yourself until you apply the security update.

  • Enable the Windows Consent Prompt: In the observed attacks, the User Control Account interface displays a window with a consent prompt. This appears depending on the privileges of the current user, before the file can be downloaded. Make sure that this feature is enabled, as it can prevent you from downloading infected files before it’s too late.
  • Enable fewer user rights on your systems: The hacker who infiltrates your system will gain the same usage rights as the currently logged-in user. This means that the more user rights they have, the more damage they can do. Either way, the average employee shouldn’t have administrative user rights, as it could lead to them performing unapproved tasks, like downloading unnecessary software and such.
  • Avoid email phishing attacks: In theory, a hacker could convince an unaware user to visit an infected web page which could contain a vulnerable office file. They will typically do this by using links in malicious emails. Keep an eye out for suspicious activity, and never click on a link unless you know where it goes.
  • Avoid downloading files from the Internet in general: Files from the web can contain any number of worms, viruses, malware, adware or other malicious entities you want nowhere near your network.

As always, it’s important that you apply the latest security updates as they are released. ClearView IT can take care of this for you remotely and efficiently, so you don’t have to take the time to do so yourself.

In the face of tough threats such as this one, it’s best to equip your business with a comprehensive security solution, like ClearView IT’s Unified Threat Management device (UTM). With a UTM, you can rest easy knowing that your network is protected by powerful firewalls, antivirus, web content filtering and spam protection solutions designed to keep the threats out. For more information about how to integrate a UTM device into your business’s security plans, give ClearView IT a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Disaster Recovery Passwords Holiday Covid-19 Windows 10 IT Support Apps Browser Managed Service Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Managed IT services Networking Windows Gadgets Workplace Strategy Artificial Intelligence Bandwidth Business Technology WiFi Blockchain Encryption Mobile Device Management App Server Information Virtualization Remote Spam Budget Gmail Office Apple Two-factor Authentication Employee/Employer Relationship History Information Technology Office 365 BDR Analytics Wi-Fi Cybercrime Conferencing Big Data Access Control Data Security Health Remote Monitoring Hacker Voice over Internet Protocol Save Money Remote Computing IT Management Compliance Training Help Desk Hacking Cost Management Patch Management Employer-Employee Relationship Vendor Document Management Project Management Data storage Money Hiring/Firing Customer Service Outlook Mobile Office Unified Threat Management Password Firewall Managed Services Augmented Reality Word Data loss BYOD IBM Website Computing Vendor Management Hard Drive Search... Best Practice Applications Retail Legal Alert Vulnerabilities Monitoring User Healthcare Social Travel Remote Workers Sports Virtual Reality SaaS DDoS Websites Social Engineering Cryptocurrency Windows 7 Mobility Meetings Black Market Free Resource Chrome Cleaning iPhone Education Google Maps Cortana Scam Robot How To Content Filtering Mobile Computing Router VPN Marketing Update The Internet of Things Running Cable YouTube Twitter Data Breach Storage Law Enforcement End of Support Laptop Paperless Office Printer Antivirus Maintenance Windows 11 Notifications Multi-factor Authentication HIPAA Professional Services Unified Communications Virtual Desktop Start Menu Google Docs Experience Downloads Saving Time Bluetooth Computer Care Distributed Denial of Service Vulnerability Office Tips Managed Services Provider Bitcoin Private Cloud Memory Computers Virtual Private Network Software as a Service Data Protection Telephone Disaster Current Events Politics PowerPoint Excel Solutions Lithium-ion battery Machine Learning Settings Administration Presentation Integration Solid State Drive Images 101 Processors Specifications Display Tech Terms IT Consultant Virtual Assistant Managed IT Chromebook Drones Digital Employees Customer Relationship Management Avoiding Downtime Co-Managed IT Automobile Entertainment Taxes Holidays How To Processor Microchip Wireless Technology Cooperation eWaste Flexibility Video Conferencing Downtime Physical Security Virtual Machines Computer Repair Safety Hack Identity Theft PCI DSS Licensing Fake News Printing Scalability Proxy Server Gig Economy CCTV Emails Humor Supply Chain Service Level Agreement Internet Service Provider Proactive IT Computing Infrastructure Azure Administrator Touchscreen Business Communications Text Messaging Emergency Bring Your Own Device Management Regulations Compliance Computer Malfunction Device security Managed IT Service Workplace Microsoft Excel Vendor Mangement Wireless Headphones Memes Samsung Going Green Net Neutrality Music Business Owner Business Cards Tech Human Resources Uninterrupted Power Supply Error Financial Data Staffing Webcam Scams IP Address Business Mangement Bookmark Risk Management IT Tablets Download Piracy Botnet Term Google Apps Rental Service Telework Micrsooft HTML Cables Microsoft 365 Google Calendar Browsers Smartwatch Flash Supercomputer Nanotechnology Communitications Telephone Systems Upload Procurement Business Growth Inbound Marketing Software License Virus Google Play Social Network FinTech Recovery Motion Sickness Competition IT Assessment Point of Sale Comparison Google Drive Data Analysis CES Screen Reader Banking LiFi Trends Supply Chain Management Google Wallet Mobile Technology Value Entrepreneur Security Cameras Knowledge Messenger Corporate Profile Customer Resource management Organization Deep Learning Documents Electronic Payment Devices Cyber security Shortcuts Application Smart Devices Tip of the week Business Intelligence Television Telephony Fileless Malware Employer Employee Relationship Business Metrics Cabling Gamification Remote Working Hosted Solution Company Culture Books Tablet Telephone System AI Securty G Suite Regulations Trend Micro Be Proactive Phone System Backup and Disaster Recovery Electronic Health Records Society Domains Transportation Mouse VoIP Directions Digital Security Cameras Language Tracking Content Desktop Wasting Time Modem Reading Electronic Medical Records Monitors Web Server Accountants eCommerce Visible Light Communication Workplace Strategies Digital Payment Database Surveillance Windows 8 SharePoint Videos Worker Managing Costs Computer Accessories SSID Relocation Access Health IT Displays Equifax Advertising Public Speaking Public Cloud Tactics Development Tech Support Hard Drive Disposal Employer/Employee Relationships Time Management Media Work/Life Balance Streaming Media Username Virtual Machine Keyboard Freedom of Information Audit Spyware Reviews Startup Optimization Smart Technology Hard Drives File Sharing Addiction email scam Teamwork intranet In Internet of Things Navigation 2FA Redundancy Hacks Data Storage Network Congestion Wireless Mobile Security Hypervisor Shortcut News Medical IT Environment Reliable Computing Cache User Tip Shopping Writing Legislation Heating/Cooling Workers Network Management Troubleshooting SQL Server Social Networking Unified Threat Management Evernote Paperless Windows XP

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?