<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Excel — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/excel/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/excel/feed.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft Office Excel Use-After-Free Vulnerability (CVE-2026-32198)</title><link>https://feed.craftedsignal.io/briefs/2026-04-excel-use-after-free/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-excel-use-after-free/</guid><description>CVE-2026-32198 is a use-after-free vulnerability in Microsoft Office Excel that allows an attacker to execute code locally on a vulnerable system.</description><content:encoded><![CDATA[<p>CVE-2026-32198 is a critical use-after-free vulnerability affecting Microsoft Office Excel. Discovered and reported on April 14, 2026, this vulnerability allows an unauthenticated, local attacker to execute arbitrary code on a target system. The vulnerability stems from improper memory management within Excel while processing malformed or specially crafted Excel files. Successful exploitation of this flaw could lead to complete system compromise, allowing attackers to install malware, steal sensitive data, or pivot to other systems within the network. This vulnerability impacts systems running vulnerable versions of Microsoft Office Excel.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Excel file designed to trigger the use-after-free vulnerability.</li>
<li>The attacker delivers the malicious Excel file to the victim via social engineering.</li>
<li>The victim opens the malicious Excel file using a vulnerable version of Microsoft Office Excel.</li>
<li>Excel attempts to access a memory location that has already been freed, triggering the vulnerability.</li>
<li>The attacker gains control of the execution flow due to the use-after-free condition.</li>
<li>The attacker injects malicious code into the Excel process&rsquo;s memory space.</li>
<li>The injected code executes with the privileges of the user running Excel.</li>
<li>The attacker can install malware, steal data, or perform other malicious activities on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32198 allows an attacker to execute arbitrary code on a vulnerable system. This can lead to complete system compromise, data theft, malware installation, and potentially further network compromise. Organizations that rely heavily on Excel for data processing and analysis are particularly at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch released by Microsoft to address CVE-2026-32198 on all systems running Microsoft Office Excel.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect potential exploitation attempts of CVE-2026-32198.</li>
<li>Educate users about the risks of opening suspicious or unexpected Excel files delivered via email or other means.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>excel</category><category>code-execution</category></item><item><title>Microsoft Excel Use-After-Free Vulnerability (CVE-2026-32189)</title><link>https://feed.craftedsignal.io/briefs/2026-04-excel-uaf/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-excel-uaf/</guid><description>CVE-2026-32189 is a use-after-free vulnerability in Microsoft Excel that allows a local attacker to execute arbitrary code by exploiting memory corruption.</description><content:encoded><![CDATA[<p>CVE-2026-32189 is a use-after-free vulnerability affecting Microsoft Office Excel. This flaw can be exploited by an attacker to execute arbitrary code on a vulnerable system. The vulnerability arises from improper memory management within the application when handling specific Excel files. While the exact versions affected are not detailed, the vulnerability was reported on April 14, 2026. Successful exploitation requires a user to open a specially crafted Excel file, which triggers the use-after-free condition. This vulnerability is significant because it allows for local code execution, potentially leading to further compromise of the affected system. Defenders should prioritize patching vulnerable Excel installations and implement detection measures to identify potential exploitation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Excel file designed to trigger the use-after-free vulnerability (CVE-2026-32189).</li>
<li>The attacker delivers the malicious Excel file to the victim via email or other means.</li>
<li>The victim opens the malicious Excel file using a vulnerable version of Microsoft Excel.</li>
<li>Excel attempts to access a memory location that has already been freed, triggering the use-after-free condition.</li>
<li>The attacker leverages the memory corruption to overwrite critical data structures in Excel&rsquo;s memory space.</li>
<li>The attacker redirects program execution to attacker-controlled code within the Excel process.</li>
<li>The attacker executes arbitrary code with the privileges of the user running Excel.</li>
<li>The attacker can then install malware, steal sensitive data, or perform other malicious actions on the local system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32189 allows an attacker to execute arbitrary code on the victim&rsquo;s machine. This can lead to a complete compromise of the system, including data theft, malware installation, and privilege escalation. The vulnerability poses a significant risk to organizations that rely on Microsoft Excel for daily operations, as a single compromised user can provide a foothold for further attacks within the network. While specific victim counts are unavailable, the widespread use of Microsoft Excel suggests a potentially large attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to patch CVE-2026-32189 immediately (<a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32189)">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32189)</a>.</li>
<li>Deploy the provided Sigma rules to detect potential exploitation attempts based on suspicious process creation and file activity.</li>
<li>Monitor process creation events for unusual child processes spawned by Excel.exe, using <code>logsource</code> category <code>process_creation</code>.</li>
<li>Monitor file access events for Excel accessing unusual locations or creating suspicious files, using <code>logsource</code> category <code>file_event</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>code-execution</category><category>excel</category><category>cve-2026-32189</category></item><item><title>Microsoft Excel Out-of-Bounds Read Vulnerability (CVE-2026-32188)</title><link>https://feed.craftedsignal.io/briefs/2026-04-excel-oob-read/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-excel-oob-read/</guid><description>An out-of-bounds read vulnerability in Microsoft Office Excel (CVE-2026-32188) allows a local attacker to potentially disclose sensitive information through a maliciously crafted Excel file.</description><content:encoded><![CDATA[<p>CVE-2026-32188 describes an out-of-bounds read vulnerability affecting Microsoft Office Excel. According to the NVD, this vulnerability allows an unauthorized attacker to disclose information locally. The CVSS v3.1 score is 7.1, indicating a high severity. The vulnerability resides within how Excel parses certain file formats, potentially allowing a malicious actor to craft a file that, when opened, causes Excel to read memory outside of allocated buffers. This can lead to the disclosure of sensitive information contained in the application&rsquo;s memory space. While the source doesn&rsquo;t specify affected versions or a specific attack campaign, successful exploitation requires user interaction to open the malicious file. Defenders should focus on detecting abnormal process behavior in Excel and promptly applying available patches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Excel file designed to trigger the out-of-bounds read vulnerability (CVE-2026-32188).</li>
<li>The attacker delivers the crafted Excel file to a victim via social engineering or other means.</li>
<li>The victim opens the malicious Excel file.</li>
<li>Excel attempts to parse the malformed data structures within the file.</li>
<li>Due to the vulnerability, Excel reads memory outside the intended buffer boundaries.</li>
<li>The out-of-bounds read results in the disclosure of sensitive information from Excel&rsquo;s memory.</li>
<li>The attacker retrieves the disclosed information, potentially containing sensitive data or internal application state.</li>
<li>The attacker uses the disclosed information for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32188 can lead to the disclosure of sensitive information from the victim&rsquo;s system. While the vulnerability is local, the disclosed information could include credentials, internal network details, or other sensitive data that could be used for further attacks. The number of potential victims is broad, encompassing any user of Microsoft Office Excel. The impact could range from minor data leaks to more significant compromises depending on the nature of the disclosed information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to patch CVE-2026-32188 on all affected systems. Reference the Microsoft advisory linked in the references section for specific instructions.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious Excel Process Creation&rdquo; to identify potentially malicious Excel activity.</li>
<li>Monitor for unusual network connections originating from Excel processes after opening untrusted documents.</li>
<li>Educate users about the risks of opening unsolicited or suspicious Excel files to prevent initial access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>excel</category><category>out-of-bounds read</category><category>cve-2026-32188</category><category>information disclosure</category><category>vulnerability</category></item></channel></rss>