Like millions of others, do you use Excel?

According to cybersecurity experts at Cisco Talos, Microsoft Office has a high-severity vulnerability that could allow prospective cyber attackers to execute malicious code on the target device remotely.

Microsoft announced the issue in a brief blog post, stating that its researcher Marcin 'Icewall' Noga had identified a class attribute double-free vulnerability impacting Microsoft Excel.

The victim would give the attacker access to their device by launching a malicious Excel file. The vulnerability is listed as CVE-2022-41106.

Microsoft has already released a patch after receiving notification of the issue. Therefore, users of Excel are recommended to upgrade to versions 2207 build 15427.20210, and 2202 build 14931.20660 of their software.


Office users are targeted

One of the most common attack vectors used by hackers is still Microsoft's office suite. Until recently, the most common method for getting office users to download and install malware on their devices and open the door to more severe hacks like identity theft or ransomware was through Office documents containing dangerous macros delivered over email.

Microsoft recently opted to disable the software's ability to run macros in files downloaded online instead of a secure local network. Due to these security measures, cybercriminals started using Windows shortcut files (.lnk), which are now frequently used to load malicious.dlls and other malware instead of macros.


My perspective

No matter what security precautions businesses and software developers put in place, the weakest link in cybersecurity is still the users. Criminals will always find a method to con users into downloading and executing malware unless the users are educated and trained to prevent cyberattacks.


"Tell me and I forget. Teach me and I remember.
Involve me and I learn." -Benjamin Franklin


By Denis Wilson

Cybersecurity Expert, Small Business Technology Consultant, Managed Services Provider, Managed IT Support

Thanks for reading this post. I always take into mind that your time and attention are precious. And these posts need to be timely, to the point, and short.

For more tips on thriving with small business technology, check out the other blog posts at DWPIA Blogs. You can also find me on LinkedIn, Facebook, and Twitter

I am also a published author and speaker on cloud computing, work-at-home, and cybersecurity. I work extensively with business and professional associations to provide free small business technology education programs.


Contact me if you would like me to speak to your association