Mitigation
By default, Microsoft Office opens documents from the internet in Protected View or in Application Guard for Office, both of which prevent the current attack. For information about Protected View, see What is Protected View?. For information about Application Guard for Office, see Application Guard for Office. Customers of Microsoft Defender for Endpoint can enable attack surface reduction rule "BlockOfficeCreateProcessRule" that blocks Office apps from creating child processes. Creating malicious child processes is a common malware strategy. For more information see Use attack surface reduction rules to prevent malware infection.
Workaround
Disabling the installation of all ActiveX controls in Internet Explorer mitigates this attack. This can be accomplished for all sites by configuring the Group Policy using your Local Group Policy Editor or by updating the registry. Previously-installed ActiveX controls will continue to run, but do not expose this vulnerability. To disable ActiveX controls via Group Policy In Group Policy settings, navigate to Computer Configuration > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page For each zone: Select the zone (Internet Zone, Intranet Zone, Local Machine Zone, or Trusted Sites Zone). Double-click Download signed ActiveX controls and Enable the policy. Then set the option in the policy to Disable. Double-click Download unsigned ActiveX controls and Enable the policy. Then set the option in the policy to Disable. We recommend applying this setting to all zones to fully protect your system. Impact of workaround. This sets the URLACTION_DOWNLOAD_SIGNED_ACTIVEX (0x1001) and URLACTION_DOWNLOAD_UNSIGNED_ACTIVEX (0x1004) to DISABLED (3) for all internet zones for 64-bit and 32-bit processes. New ActiveX controls wi...
FAQ
There are three updates listed in the Security Updates table for Windows 8.1, Windows Server 2012 R2, and Windows Server 2012. Which updates do I need to apply to my system to be protected from this vulnerability? Customers running Windows 8.1, Windows Server 2012 R2, or Windows Server 2012 can apply either the Monthly Rollup or both the Security Only and the IE Cumulative updates. I am running Windows 7, Windows Server 2008 R2, or Windows Server 2008. Do I need to apply both the Monthly Rollup and the IE Cumulative updates? The Monthly Rollup for Windows 7, Windows Server 2008 R2, and Windows Server 2008 includes the update for this vulnerability. Customers who apply the Monthly Rollup do not need to apply the IE Cumulative update. Customers who only apply Security Only updates need to also apply the IE Cumulative update to be protected from this vulnerability.