WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Vulnerability Management – Exploitation of Zero-day Vulnerability in Microsoft MSHTML Leveraging Office Documents
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Vulnerability Management – Exploitation of Zero-day Vulnerability in Microsoft MSHTML Leveraging Office Documents

Author: Jennifer Walker

Created: Thursday, September 9, 2021 - 16:39

Categories: Cybersecurity

Attention: Given widespread use of Microsoft Windows and Office applications that potentially use this component, system administrators are encouraged to review available advisories for CVE-2021-40444 and address accordingly for impacted systems within their environment. CISA has posted a current activity report, Microsoft Releases Mitigations and Workarounds for CVE-2021-40444. 

What is the bug? A critical remote code execution (RCE) vulnerability within Microsoft MSHTML affecting Windows Server 2008 through 2019 and Windows 8.1 through 10. This vulnerability is tracked as CVE-2021-40444. While MSHTML is most notably used in the now unsupported Internet Explorer, it is also used to render web-hosted content inside Office applications. An attacker could use a malicious ActiveX control to display web content within applications such as Word, Power Point, or Excel.

Why is it important? Due to widespread use of Microsoft Windows and the vulnerability existing in most currently supported systems (Windows Server 2008 through 2019 and Windows 8.1 through 10).

Is there a patch? No. Microsoft is expected to include a fix in next week’s “Patch Tuesday.” This vulnerability is currently considered a “zero-day,” meaning there is no patch available.

Are there other mitigations or workarounds available until a patch is released? Yes, but sysadmins are encouraged to review mitigations and workarounds closely for potential caveats that may limit effectiveness within your environment.

Is this being actively exploited? Yes. Microsoft states they are aware of active exploitation from malicious threat actors. Likewise, multiple researchers are observing current activity attempting to leverage this vulnerability.

Additional Resources:

  • https://therecord.media/microsoft-warns-of-new-ie-zero-day-exploited-in-targeted-office-attacks/
  • https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/09/windows-mshtml-zero-day-actively-exploited-mitigations-required/
  • https://us-cert.cisa.gov/ncas/current-activity/2021/09/07/microsoft-releases-mitigations-and-workarounds-cve-2021-40444
  • https://www.bleepingcomputer.com/news/security/microsoft-shares-temp-fix-for-ongoing-office-365-zero-day-attacks/
  • https://www.securityweek.com/microsoft-office-zero-day-hit-targeted-attacks
  • https://www.helpnetsecurity.com/2021/09/08/cve-2021-40444/

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar