Article Details
Scrape Timestamp (UTC): 2025-08-13 15:52:51.183
Source: https://www.theregister.com/2025/08/13/crooks_cant_let_go_active/
Original Article Text
Click to Toggle View
Crooks can't let go: Active attacks target Office vuln patched 8 years ago. CVE-2017-11882 in discontinued Equation Editor still attracting keylogger campaigns despite software being killed off in 2018. Very few people are immune to the siren song of nostalgia, a yearning for a "better time" when this was all fields and kids respected their elders - and it looks like cyber criminals are no exception. Malware campaigns continue targeting a 2017-patched vulnerability in Microsoft Office Equation Editor software that was discontinued in 2018, according to an infosec hound at SANS Internet Storm Centre. "One of the key messages broadcasted by security professionals is: 'Patch, patch, and patch again,'" said security consultant Xavier Mertens said in a malware analysis posted to the today. "But [there] are nasty vulnerabilities that remain exploited by attackers even if they are pretty old. CVE-2017-11882 is one of them: this remote code execution affects Microsoft Office and, more precisely, the good old 'Equation Editor.' "This tool was even killed by Microsoft due to numerous security issues. But it still remains used by attackers to spread modern malware," he added. CVE-2017-11882, published in November 2017, covers a remote code execution vulnerability in Microsoft Office's Equation Editor 3.0 - allowing an attacker with a malicious document to take over any system running an affected version of Microsoft Office or WordPad. "In an email attack scenario," the company warned at the time, "an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability." The flaw was patched, though other issues would lead Microsoft to remove the original Equation Editor - built atop the more powerful MathType software from Data Science and retained for longer than it should have been to provide backwards compatibility - altogether in 2018, replacing it with a from-scratch successor at the cost of a loss of support for editing equations in older files. As a result, no currently-supported versions of Office are vulnerable to exploitation through CVE-2017-11882 - but that isn't stopping attackers from trying, apparently eager for a return to the bad old days of easily-exploited Swiss-cheese productivity suites. Mertens' write-up covers an XLAM file, a VisualBasic-enabled add-in for Microsoft Excel, masquerading as a purchase order - and containing not the excepted malicious VBA macro but an exploit targeting the long-since-shuttered Equation Editor. If loaded into a vulnerable version of Office or WordPad, a difficult thing to do in the year 2025 unless you're really trying, the file installs a shiny new keylogger - and you can kiss your system security goodbye. Those still running software impacted by CVE-2017-11882 are advised to maybe not do that any more, unless you want to make a nostalgic malware author's day a happy one.
Daily Brief Summary
Cybercriminals continue exploiting CVE-2017-11882, a vulnerability in Microsoft Office's discontinued Equation Editor, despite its patch release eight years ago.
The vulnerability allows remote code execution through malicious documents, impacting systems running outdated Microsoft Office or WordPad versions.
Attackers leverage this flaw by distributing specially crafted files via email or compromised websites, targeting users who open these files.
The vulnerability was patched in 2017, and Microsoft removed the Equation Editor in 2018, yet attackers persist in exploiting unpatched systems.
Recent campaigns involve XLAM files masquerading as purchase orders, which deploy keyloggers when executed on vulnerable software.
Organizations are advised to ensure all systems are updated to eliminate exposure to this and similar legacy vulnerabilities.
This ongoing exploitation highlights the critical importance of maintaining up-to-date software to prevent attacks leveraging outdated vulnerabilities.