<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Microsoft MSHTML RCE - CVE-2021-40444 : how Cisco replies? in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462740#M6378</link>
    <description>We have signature-based coverage since yesterday. Our team is working on adding more coverage through Behavioral Protection engine and Cloud IOCs.&lt;BR /&gt;</description>
    <pubDate>Thu, 09 Sep 2021 19:48:06 GMT</pubDate>
    <dc:creator>DaphneG</dc:creator>
    <dc:date>2021-09-09T19:48:06Z</dc:date>
    <item>
      <title>Microsoft MSHTML RCE - CVE-2021-40444 : how Cisco replies?</title>
      <link>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462476#M6375</link>
      <description>&lt;P&gt;In a new advisory (&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444" target="_blank" rel="noopener"&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444&lt;/A&gt;), Microsoft mentions (normal, their product) that Microsoft Defender...&amp;nbsp;&lt;SPAN&gt;provide detection and protections for the known vulnerability. Also... alerts will be displayed as: “Suspicious Cpl File Execution”.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What is Cisco's behaviour in regards to this one?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Tks.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Sep 2021 12:47:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462476#M6375</guid>
      <dc:creator>00urb57x9u0O6CPE25d6</dc:creator>
      <dc:date>2021-09-09T12:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft MSHTML RCE - CVE-2021-40444 : how Cisco replies?</title>
      <link>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462621#M6377</link>
      <description>&lt;P&gt;Our Research and Efficacy team is currently investigating this vulnerability. We'll share the findings as soon as it's available.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Sep 2021 16:23:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462621#M6377</guid>
      <dc:creator>DaphneG</dc:creator>
      <dc:date>2021-09-09T16:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft MSHTML RCE - CVE-2021-40444 : how Cisco replies?</title>
      <link>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462740#M6378</link>
      <description>We have signature-based coverage since yesterday. Our team is working on adding more coverage through Behavioral Protection engine and Cloud IOCs.&lt;BR /&gt;</description>
      <pubDate>Thu, 09 Sep 2021 19:48:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462740#M6378</guid>
      <dc:creator>DaphneG</dc:creator>
      <dc:date>2021-09-09T19:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft MSHTML RCE - CVE-2021-40444 : how Cisco replies?</title>
      <link>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462755#M6379</link>
      <description>I meant to include earlier that for those interested Cisco Talos also released new SNORT rules for this CVE: &lt;A href="https://blog.talosintelligence.com/2021/09/talos-release-protection-against-zero.html#more" target="_blank"&gt;https://blog.talosintelligence.com/2021/09/talos-release-protection-against-zero.html#more&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 09 Sep 2021 20:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462755#M6379</guid>
      <dc:creator>DaphneG</dc:creator>
      <dc:date>2021-09-09T20:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft MSHTML RCE - CVE-2021-40444 : how Cisco replies?</title>
      <link>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462903#M6380</link>
      <description>&lt;P&gt;Talos mentions deploying "&lt;SPAN&gt;ClamAV signature&amp;nbsp;Doc.Exploit.CVE_2012_40444-9891528-0" is this something we as AMP administrators need to do or is this already done for us?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Otherwise, it would be great if Cisco would provide some Custom Detections - Advanced Signature sets we could use in the meantime.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 03:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462903#M6380</guid>
      <dc:creator>ITGuyCSI25</dc:creator>
      <dc:date>2021-09-10T03:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft MSHTML RCE - CVE-2021-40444 : how Cisco replies?</title>
      <link>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462905#M6381</link>
      <description>This article mentions some IOCs:&lt;BR /&gt;&lt;A href="https://www.bleepingcomputer.com/news/microsoft/windows-mshtml-zero-day-defenses-bypassed-as-new-info-emerges/" target="_blank"&gt;https://www.bleepingcomputer.com/news/microsoft/windows-mshtml-zero-day-defenses-bypassed-as-new-info-emerges/&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Sep 2021 03:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4462905#M6381</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2021-09-10T03:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft MSHTML RCE - CVE-2021-40444 : how Cisco replies?</title>
      <link>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4463687#M6382</link>
      <description>&lt;P&gt;Is there anything to be done on Cisco AMP side?&amp;nbsp; Does this vulnerability covered under Tetra signatures of Cisco AMP?&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 23:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4463687#M6382</guid>
      <dc:creator>mnarayandas</dc:creator>
      <dc:date>2021-09-10T23:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft MSHTML RCE - CVE-2021-40444 : how Cisco replies?</title>
      <link>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4465164#M6387</link>
      <description>&lt;P&gt;Also would like information regarding what needs to be done on the Cisco AMP side&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 15:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4465164#M6387</guid>
      <dc:creator>reubooke</dc:creator>
      <dc:date>2021-09-13T15:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft MSHTML RCE - CVE-2021-40444 : how Cisco replies?</title>
      <link>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4465257#M6388</link>
      <description>&lt;P&gt;Sorry for the delay in the response. AMP has released the following Cloud IOCs and Behavioral Protection (BP) signature since Thursday afternoon:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;W32.WinwordLaunchedControl.ioc (Cloud IOC)
W32.SuspiciousControl_RunDLLExecution.ioc (Cloud IOC)
Suspicious Control Process Pattern (BP signature)&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The details of each can be found in the Indicators page:&amp;nbsp;&lt;A href="https://console.amp.cisco.com/indicators" target="_blank"&gt;https://console.amp.cisco.com/indicators&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You might want to monitor and investigate the endpoints that triggered these events.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 17:44:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/microsoft-mshtml-rce-cve-2021-40444-how-cisco-replies/m-p/4465257#M6388</guid>
      <dc:creator>DaphneG</dc:creator>
      <dc:date>2021-09-13T17:44:51Z</dc:date>
    </item>
  </channel>
</rss>

