CVE-2021-40444

HIGH KEV RANSOMWARE

Microsoft Office Word Malicious MSHTML RCE

Title source: metasploit

Description

<p>Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.</p> <p>An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Microsoft Defender Antivirus and Microsoft Defender for Endpoint both provide detection and protections for the known vulnerability. Customers should keep antimalware products up to date. Customers who utilize automatic updates do not need to take additional action. Enterprise customers who manage updates should select the detection build 1.349.22.0 or newer and deploy it across their environments. Microsoft Defender for Endpoint alerts will be displayed as: “Suspicious Cpl File Execution”.</p> <p>Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.</p> <p>Please see the <strong>Mitigations</strong> and <strong>Workaround</strong> sections for important information about steps you can take to protect your system from this vulnerability.</p> <p><strong>UPDATE</strong> September 14, 2021: Microsoft has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. Please see the FAQ for important information about which updates are applicable to your system.</p>

Exploits (48)

nomisec WORKING POC 1,714 stars
by lockedbyte · client-side
https://github.com/lockedbyte/CVE-2021-40444
nomisec WORKING POC 823 stars
by klezVirus · client-side
https://github.com/klezVirus/CVE-2021-40444
nomisec WORKING POC 170 stars
by aslitsecurity · client-side
https://github.com/aslitsecurity/CVE-2021-40444_builders
nomisec WORKING POC 104 stars
by Edubr2020 · poc
https://github.com/Edubr2020/CVE-2021-40444--CABless
nomisec WORKING POC 66 stars
by 34zY · client-side
https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit
nomisec WRITEUP 19 stars
by k8gege · poc
https://github.com/k8gege/CVE-2021-40444
nomisec WRITEUP 16 stars
by ozergoker · poc
https://github.com/ozergoker/CVE-2021-40444
nomisec NO CODE 16 stars
by rfcxv · poc
https://github.com/rfcxv/CVE-2021-40444-POC
nomisec WORKING POC 13 stars
by mansk1es · poc
https://github.com/mansk1es/Caboom
nomisec WORKING POC 9 stars
by kagura-maru · poc
https://github.com/kagura-maru/CVE-2021-40444-POC
nomisec WORKING POC 9 stars
by H0j3n · client-side
https://github.com/H0j3n/CVE-2021-40444
github WORKING POC 8 stars
by codecat007 · cpoc
https://github.com/codecat007/cvehub/tree/main/windows/CVE-2021-40444
nomisec WRITEUP 7 stars
by DarkSprings · poc
https://github.com/DarkSprings/CVE-2021-40444
nomisec WRITEUP 5 stars
by LazarusReborn · poc
https://github.com/LazarusReborn/Docx-Exploit-2021
nomisec WRITEUP 4 stars
by fengjixuchui · poc
https://github.com/fengjixuchui/CVE-2021-40444-docx-Generate
nomisec WRITEUP 3 stars
by vysecurity · poc
https://github.com/vysecurity/CVE-2021-40444
nomisec WORKING POC 3 stars
by bambooqj · client-side
https://github.com/bambooqj/CVE-2021-40444_EXP_JS
nomisec WORKING POC 2 stars
by MRacumen · client-side
https://github.com/MRacumen/CVE-2021-40444
nomisec WORKING POC 1 stars
by Zeop-CyberSec · client-side
https://github.com/Zeop-CyberSec/word_mshtml
nomisec STUB 1 stars
by k4k4 · poc
https://github.com/k4k4/CVE-2021-40444-Sample
gitlab WORKING POC
by helsecert_pocs · poc
https://gitlab.com/helsecert_pocs/cve-2021-40444
nomisec WORKING POC
by basim-ahmad · client-side
https://github.com/basim-ahmad/Follina-CVE-and-CVE-2021-40444
nomisec WORKING POC
by hqdat809 · client-side
https://github.com/hqdat809/CVE-2021-40444
nomisec WRITEUP
by nvchungkma · poc
https://github.com/nvchungkma/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-
nomisec WORKING POC
by lisinan988 · poc
https://github.com/lisinan988/CVE-2021-40444-exp
nomisec WORKING POC
by Alexcot25051999 · poc
https://github.com/Alexcot25051999/CVE-2021-40444
nomisec WORKING POC
by tiagob0b · poc
https://github.com/tiagob0b/CVE-2021-40444
nomisec WORKING POC
by kal1gh0st · client-side
https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives
nomisec WORKING POC
by Jeromeyoung · poc
https://github.com/Jeromeyoung/TIC4301_Project
nomisec WORKING POC
by metehangenel · poc
https://github.com/metehangenel/MSHTML-CVE-2021-40444
nomisec WORKING POC
by Phuong39 · poc
https://github.com/Phuong39/CVE-2021-40444-CAB
nomisec STUB
by Jeromeyoung · poc
https://github.com/Jeromeyoung/MSHTMHell
nomisec WORKING POC
by Immersive-Labs-Sec · client-side
https://github.com/Immersive-Labs-Sec/cve-2021-40444-analysis
nomisec WRITEUP
by jamesrep · poc
https://github.com/jamesrep/cve-2021-40444
nomisec WORKING POC
by W1kyri3 · poc
https://github.com/W1kyri3/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx
nomisec WRITEUP
by KnoooW · poc
https://github.com/KnoooW/CVE-2021-40444-docx-Generate
metasploit WORKING POC EXCELLENT
by lockedbyte, klezVirus, thesunRider, mekhalleh (RAMELLA Sébastien) · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/word_mshtml_rce.rb
patchapalooza WORKING POC
by Moxin1044 · poc
https://gitee.com/Moxin1044/CVE-2021-40444
patchapalooza WORKING POC
by joecool0 · poc
https://gitee.com/joecool0/CVE-2021-40444
patchapalooza WORKING POC
by xiaocainiao149 · poc
https://gitee.com/xiaocainiao149/CVE-2021-40444
patchapalooza WORKING POC
by mirrors_trending · poc
https://gitee.com/mirrors_trending/CVE-2021-40444_1
patchapalooza WORKING POC
by zyjsuper · poc
https://gitee.com/zyjsuper/CVE-2021-40444
patchapalooza SUSPICIOUS
by aydianosec · client-side
https://github.com/aydianosec/CVE2021-40444
patchapalooza WORKING POC
by mirrors_trending · poc
https://gitee.com/mirrors_trending/CVE-2021-40444
patchapalooza WORKING POC
by evaltx · poc
https://gitee.com/evaltx/CVE-2021-40444

Scores

CVSS v3 8.8
EPSS 0.9433
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L

Details

CISA KEV 2021-11-03
VulnCheck KEV 2021-09-07
InTheWild.io 2021-09-07
ENISA EUVD EUVD-2021-27621
Ransomware Use Confirmed
CWE
CWE-22
Status published
Products (18)
microsoft/windows_10_1507 < 10.0.10240.19060
microsoft/windows_10_1607 < 10.0.14393.4651
microsoft/windows_10_1809 < 10.0.17763.2183
microsoft/windows_10_1909 < 10.0.18363.1801
microsoft/windows_10_2004 < 10.0.19041.1237
microsoft/windows_10_20h2 < 10.0.19042.1237
microsoft/windows_10_21h1 < 10.0.19043.1237
microsoft/windows_7
microsoft/windows_8.1
microsoft/windows_rt_8.1
... and 8 more
Published Sep 15, 2021
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026