<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Office Click-to-Run — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/office-click-to-run/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 18:50:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/office-click-to-run/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-40420 - Microsoft Office Click-To-Run Improper Access Control Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40420/</link><pubDate>Tue, 12 May 2026 18:50:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40420/</guid><description>CVE-2026-40420 is an improper access control vulnerability in Microsoft Office Click-To-Run allowing an authorized attacker to elevate privileges locally.</description><content:encoded><![CDATA[<p>CVE-2026-40420 is an improper access control vulnerability affecting Microsoft Office Click-To-Run. An authorized attacker who successfully exploits this vulnerability can elevate their privileges on the local system. The vulnerability stems from insufficient checks on user permissions during certain operations within the Click-To-Run component. Successful exploitation would allow the attacker to perform actions with higher privileges than intended, potentially leading to system compromise. This vulnerability impacts systems running vulnerable versions of Microsoft Office Click-To-Run. Defenders should apply the patch released by Microsoft to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system with standard user privileges.</li>
<li>The attacker identifies a vulnerable function within Microsoft Office Click-To-Run that is susceptible to improper access control.</li>
<li>The attacker crafts a malicious payload or exploits a specific API call within Click-To-Run.</li>
<li>The crafted payload bypasses the insufficient access control checks.</li>
<li>The Click-To-Run component executes the attacker&rsquo;s payload with elevated privileges.</li>
<li>The attacker leverages the elevated privileges to perform unauthorized actions on the local system.</li>
<li>The attacker escalates privileges further to gain SYSTEM level access.</li>
<li>The attacker can then install software, modify data, or create new accounts with full administrative rights.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40420 allows a local attacker to elevate privileges on a vulnerable system. This can lead to complete system compromise, including unauthorized data access, modification, or deletion, as well as the installation of malicious software. The vulnerability affects any system running a vulnerable version of Microsoft Office Click-To-Run.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to address CVE-2026-40420 as soon as possible; reference the Microsoft advisory for CVE-2026-40420.</li>
<li>Monitor process creations for unusual child processes spawned by Office Click-To-Run processes to identify potential privilege escalation attempts using the &ldquo;Office Click-To-Run Suspicious Child Process&rdquo; Sigma rule.</li>
<li>Enable process creation auditing to ensure that the relevant logs are available for detection and investigation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>office</category><category>windows</category></item><item><title>CVE-2026-40418: Microsoft Office Click-To-Run Use-After-Free Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40418-office-uaf/</link><pubDate>Tue, 12 May 2026 18:49:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40418-office-uaf/</guid><description>CVE-2026-40418 is a use-after-free vulnerability in Microsoft Office Click-To-Run that allows an authorized attacker to elevate privileges locally.</description><content:encoded><![CDATA[<p>CVE-2026-40418 is a use-after-free vulnerability affecting Microsoft Office Click-To-Run. This vulnerability allows an attacker with local access and authorization to elevate their privileges on the system. The vulnerability arises from improper memory management within the Click-To-Run component. An authorized attacker could potentially exploit this flaw to execute arbitrary code with elevated privileges, leading to unauthorized access and control over the affected system. Successful exploitation requires the attacker to already have some level of access to the target machine.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial authorized access to the target system.</li>
<li>Attacker identifies a process using the vulnerable Microsoft Office Click-To-Run component.</li>
<li>Attacker triggers the use-after-free condition within the Office Click-To-Run application by sending a specially crafted input.</li>
<li>The application attempts to access a previously freed memory location, causing a crash or unexpected behavior.</li>
<li>Attacker leverages the use-after-free vulnerability to corrupt memory and redirect execution flow.</li>
<li>Attacker injects malicious code into memory.</li>
<li>The injected code is executed with the privileges of the Office Click-To-Run application.</li>
<li>Attacker elevates privileges and gains unauthorized control over the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40418 allows an authorized local attacker to elevate their privileges on the targeted system. This could lead to complete system compromise, including unauthorized access to sensitive data, installation of malware, and modification of system configurations. Given the widespread use of Microsoft Office, this vulnerability could potentially affect numerous organizations and individuals.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-40418 on all systems running Microsoft Office Click-To-Run as soon as possible (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40418)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40418)</a>.</li>
<li>Implement the Sigma rule &ldquo;Detect CVE-2026-40418 Exploitation Attempt — Suspicious Office Process Memory Access&rdquo; to detect potential exploitation attempts.</li>
<li>Monitor for suspicious process behavior and memory access patterns in Microsoft Office Click-To-Run processes.</li>
<li>Restrict local access to systems running Microsoft Office Click-To-Run to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>privilege-escalation</category><category>windows</category><category>use-after-free</category></item><item><title>CVE-2026-35436: Microsoft Office Click-To-Run Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-35436-office-privesc/</link><pubDate>Tue, 12 May 2026 18:33:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-35436-office-privesc/</guid><description>CVE-2026-35436 is a privilege escalation vulnerability in Microsoft Office Click-To-Run due to insufficient granularity of access control, allowing an authorized attacker to elevate privileges locally.</description><content:encoded><![CDATA[<p>CVE-2026-35436 is a privilege escalation vulnerability affecting Microsoft Office Click-To-Run. The vulnerability stems from insufficient granularity of access control, which allows an authorized attacker to elevate their privileges on a local system. This could allow an attacker to perform actions with elevated permissions, potentially leading to unauthorized access to sensitive data, modification of system configurations, or execution of arbitrary code. Microsoft has released a security update to address this vulnerability. This vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system with an authorized, but limited, user account.</li>
<li>The attacker identifies that the Microsoft Office Click-To-Run component has insufficient access control granularity.</li>
<li>The attacker leverages this vulnerability to bypass intended access restrictions.</li>
<li>The attacker manipulates the Click-To-Run component to perform actions normally restricted to higher-privileged users.</li>
<li>This could involve modifying configuration files or accessing protected system resources.</li>
<li>The attacker successfully elevates their privileges on the local system.</li>
<li>With elevated privileges, the attacker can now access sensitive data, install malicious software, or modify system settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35436 allows an attacker to elevate their privileges on a local system running Microsoft Office Click-To-Run. This could result in unauthorized access to sensitive data, modification of critical system configurations, or the installation and execution of malware. Given the wide deployment of Microsoft Office, this vulnerability could have a significant impact on organizations and individuals who do not apply the necessary security updates.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to address CVE-2026-35436 immediately.</li>
<li>Monitor systems for suspicious process executions or configuration changes related to Microsoft Office Click-To-Run, using a process monitoring tool.</li>
<li>Implement the Sigma rules provided below to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>cve</category></item></channel></rss>