<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Office — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/office/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/office/feed.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft Word Use-After-Free Vulnerability CVE-2026-23657</title><link>https://feed.craftedsignal.io/briefs/2026-04-cve-2026-23657-word-uaf/</link><pubDate>Wed, 15 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cve-2026-23657-word-uaf/</guid><description>CVE-2026-23657 is a use-after-free vulnerability in Microsoft Office Word allowing a local attacker to execute arbitrary code with user privileges.</description><content:encoded><![CDATA[<p>On April 14, 2026, CVE-2026-23657 was published, detailing a use-after-free vulnerability affecting Microsoft Office Word. This vulnerability allows an attacker with local access to execute arbitrary code on a vulnerable system. Successful exploitation requires user interaction, as the victim must open a specially crafted Word document. Due to the nature of use-after-free vulnerabilities, attackers can potentially achieve arbitrary code execution by manipulating memory allocation after a pointer to freed memory is dereferenced. This poses a significant threat to organizations as successful exploitation can lead to data theft, system compromise, and further lateral movement within the network. The vulnerability has a CVSS v3.1 score of 7.8, indicating a high severity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Microsoft Word document designed to trigger the use-after-free vulnerability (CVE-2026-23657).</li>
<li>The attacker delivers the malicious document to the victim, likely via email or shared file storage.</li>
<li>The victim opens the malicious document in Microsoft Word.</li>
<li>The crafted document exploits a weakness in memory management, freeing a memory region while a pointer to it is still in use.</li>
<li>The attacker leverages the use-after-free condition to overwrite the freed memory with attacker-controlled data.</li>
<li>Upon dereferencing the dangling pointer, the corrupted data is executed, leading to code execution.</li>
<li>The attacker executes arbitrary code within the context of the user running Microsoft Word.</li>
<li>The attacker may then install malware, steal sensitive information, or establish a persistent foothold on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-23657 allows an attacker to execute arbitrary code on a vulnerable system with the privileges of the user running Microsoft Word. This can lead to the installation of malware, theft of sensitive data, and further compromise of the system and network. The impact of this vulnerability is significant, as Microsoft Word is widely used in organizations of all sizes, making it a valuable target for attackers. The potential for arbitrary code execution elevates this vulnerability to a high-risk level, demanding immediate attention from security teams.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch released by Microsoft to address CVE-2026-23657 on all systems running Microsoft Office Word. (Reference: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23657">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23657</a>)</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Word Child Process</code> to detect potentially malicious processes spawned by Microsoft Word.</li>
<li>Enable process creation logging to capture process execution events, ensuring the Sigma rule has the necessary data to function.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>code-execution</category><category>office</category><category>cve-2026-23657</category></item><item><title>Suspicious WMI Image Load from MS Office</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-wmi-image-load/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-wmi-image-load/</guid><description>Adversaries may exploit Windows Management Instrumentation (WMI) to execute code stealthily, bypassing traditional security measures by loading `wmiutils.dll` from Microsoft Office applications, potentially indicating malicious execution.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious image loading of <code>wmiutils.dll</code> from Microsoft Office processes (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSPUB.EXE, MSACCESS.EXE). Adversaries can use this technique to execute code and evade traditional parent/child processes spawned from Microsoft Office products. This behavior may indicate adversarial activity where child processes are spawned via Windows Management Instrumentation (WMI).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User opens a malicious Microsoft Office document (e.g., Word, Excel).</li>
<li>The document contains a macro or exploit that triggers the execution of WMI commands.</li>
<li>The Office application spawns a WMI process or utilizes existing WMI infrastructure.</li>
<li>The WMI process loads the <code>wmiutils.dll</code> library, which is unusual for normal Office operations.</li>
<li>The WMI commands execute malicious code, potentially downloading or executing further payloads.</li>
<li>The attacker establishes persistence through WMI event subscriptions or other methods.</li>
<li>The attacker performs lateral movement using WMI to execute commands on other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code, establish persistence, and move laterally within the network, potentially leading to data exfiltration, system compromise, or ransomware deployment. While the number of victims is unknown, this technique can be used in targeted attacks against organizations that heavily rely on Microsoft Office applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious WMI Image Load from MS Office&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon event ID 7 (Image Loaded) logging for comprehensive image load monitoring as suggested in the <a href="https://ela.st/sysmon-event-7-setup">setup instructions</a>.</li>
<li>Monitor process creation events for Microsoft Office applications spawning WMI-related processes (e.g., <code>wbemtest.exe</code>, <code>wmic.exe</code>) to detect potential WMI abuse.</li>
<li>Implement network segmentation to limit lateral movement in case of a successful WMI-based attack.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wmi</category><category>image load</category><category>office</category><category>execution</category></item><item><title>Persistence via Visual Studio Tools for Office (VSTO) Add-ins</title><link>https://feed.craftedsignal.io/briefs/2024-01-vsto-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-vsto-persistence/</guid><description>The Visual Studio Tools for Office (VSTO) add-ins can be abused by attackers to establish persistence in Microsoft Office applications by modifying registry keys.</description><content:encoded><![CDATA[<p>Attackers can leverage Visual Studio Tools for Office (VSTO) add-ins to establish persistence within Microsoft Office applications. VSTO add-ins, designed to extend the functionality of Office applications, can be manipulated by threat actors to execute malicious code upon application startup. By modifying specific registry keys associated with VSTO add-ins, adversaries can ensure their code is loaded and executed each time an Office application is launched. This technique allows for covert and persistent access to compromised systems, enabling further malicious activities such as data exfiltration, lateral movement, or the deployment of additional payloads. The detection of this persistence mechanism is crucial for defenders to identify and mitigate potential compromises within their environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system via unspecified means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker identifies the registry keys associated with VSTO add-ins for Office applications (Outlook, Word, Excel, PowerPoint). These keys are typically located under <code>\Software\Microsoft\Office\[Application]\Addins\</code>.</li>
<li>The attacker modifies the registry to add or modify entries related to a malicious VSTO add-in. This involves setting the <code>LoadBehavior</code> value to <code>3</code> to ensure the add-in is loaded on startup.</li>
<li>The attacker places the malicious VSTO add-in files (DLLs) in a location accessible to the Office application.</li>
<li>The attacker may also modify the <code>\Software\Microsoft\VSTO\Security\Inclusion\</code> registry key to bypass security warnings related to unsigned add-ins.</li>
<li>The user launches the targeted Office application (e.g., Outlook).</li>
<li>The Office application loads the malicious VSTO add-in based on the modified registry entries.</li>
<li>The malicious VSTO add-in executes its payload, enabling the attacker to perform malicious activities on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistent code execution within Microsoft Office applications. This can lead to the compromise of sensitive data, the deployment of additional malware, and the establishment of a long-term foothold within the targeted environment. The scope of impact depends on the privileges of the user account and the capabilities of the malicious VSTO add-in. Since Office applications are commonly used, a successful attack could potentially affect a large number of users within an organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Persistence Via Visual Studio Tools for Office</code> to your SIEM to detect suspicious registry modifications related to VSTO add-ins.</li>
<li>Monitor registry modifications under the paths <code>\Software\Microsoft\Office\Outlook\Addins\</code>, <code>\Software\Microsoft\Office\Word\Addins\</code>, <code>\Software\Microsoft\Office\Excel\Addins\</code>, <code>\Software\Microsoft\Office\Powerpoint\Addins\</code>, and <code>\Software\Microsoft\VSTO\Security\Inclusion\</code> (see Sigma rule and references).</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted VSTO add-ins.</li>
<li>Regularly review and audit installed Office add-ins to identify and remove any suspicious or unauthorized extensions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>office</category><category>vsto</category></item><item><title>MS Office Macro Security Registry Modifications</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-macro-security-regmod/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-macro-security-regmod/</guid><description>Attackers may modify Microsoft Office registry settings related to macro security (AccessVBOM, VbaWarnings) to disable security warnings, enabling malicious macros for persistence and further compromise.</description><content:encoded><![CDATA[<p>Microsoft Office applications allow users and developers to manage macro security settings. Attackers can abuse these settings by modifying the registry to automatically trust macros or disable security warnings. This increases the likelihood of successful macro execution, potentially establishing persistence or enabling further malicious activities on the compromised system. The modifications specifically target the <code>AccessVBOM</code> and <code>VbaWarnings</code> registry values. This is a common tactic used to bypass security controls and execute malicious code within an organization, often as part of a phishing or spear phishing campaign.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious Office document containing VBA macros.</li>
<li>The victim receives the malicious document via email or other means (T1566).</li>
<li>The victim opens the document, potentially triggering a prompt to enable macros.</li>
<li>If macros are enabled or trusted due to existing settings, the malicious VBA code executes (T1204.002).</li>
<li>The VBA code modifies the Windows Registry to disable macro security warnings by setting <code>HKEY_CURRENT_USER\Software\Microsoft\Office\*\Security\VbaWarnings</code> to 1 or modifying <code>AccessVBOM</code> (T1112).</li>
<li>The attacker can then use the trusted macro environment to execute arbitrary code (T1059.005).</li>
<li>The attacker may establish persistence by creating scheduled tasks or modifying startup entries (T1547.001).</li>
<li>The attacker achieves their final objective, which may include data exfiltration, lateral movement, or deploying ransomware (TA0005, TA0002).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Office macro security protections, potentially leading to arbitrary code execution and system compromise. Disabling macro security warnings increases the attack surface within an organization, as users are no longer prompted to approve macro execution, which can lead to further malware infection and data breaches. The rule is designed to detect registry changes that could enable this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to detect the registry modifications described in this brief to trigger the detections (Sysmon Registry Events).</li>
<li>Deploy the Sigma rule &ldquo;MS Office Macro Security Registry Modifications&rdquo; to your SIEM and tune for your environment.</li>
<li>Use Group Policy Objects (GPOs) to centrally manage Office macro security settings and prevent users from modifying them (references).</li>
<li>Investigate any alerts generated by this rule to determine the source of the registry modification and whether malicious macros were subsequently executed (rule description).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>office</category><category>macro</category><category>registry</category><category>defense-evasion</category><category>windows</category></item></channel></rss>