Remote code execution vulnerability present in Windows Scripting Engine of Microsoft Windows

Australian Cyber Security Centre

Background /What has happened?

A vulnerability (CVE-2021-26435) has been identified in the Windows Scripting Engine, a component present in all installations of Microsoft Windows. Through this vulnerability a cyber actor could use a maliciously crafted file to install malware. The file could potentially be in the form of a JScript or VBScript file either by itself or incorporated into a malicious Microsoft Office document. The malicious file would likely be used as part of a spearphishing campaign.

Mitigation / How do I stay secure?

Microsoft has released security updates to address this vulnerability. Details on these security updates and a full list of affected products are available from Microsoft’s security advisory. Customers should apply these security updates as soon as possible.

Assistance / Where can I go for help?

The ACSC is monitoring the situation and is able to provide assistance and advice as required. Organisations that have been impacted or require assistance can contact the ACSC via 1300 CYBER1 (1300 292 371).

/Public Release. This material comes from the originating organization/author(s)and may be of a point-in-time nature, edited for clarity, style and length. The views and opinions expressed are those of the author(s).View in full here.