Rule Category

FILE-OFFICE -- Snort detected traffic targeting vulnerabilities in files belonging to the Microsoft Office suite of software (Excel, PowerPoint, Word, Visio, Access, Outlook, etc.).

Alert Message

FILE-OFFICE Microsoft Office remote code execution attempt

Rule Explanation

This rule looks for specially crafted files known to exploit a remote code execution vulnerability in Microsoft Office.

What To Look For

This rule alerts when Snort detects attempts to exploit a remote code execution vulnerability in Microsoft Office.

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

Rule Groups

Rule Categories::File::Office

MITRE::ATT&CK Framework::Enterprise::Initial Access::Phishing

MITRE::ATT&CK Framework::Enterprise::Execution::User Execution::Malicious File

MITRE::ATT&CK Framework::Enterprise::Lateral Movement::Remote Services::SMB/Windows Admin Shares

CVE

Additional Links

Rule Vulnerability

Memory Corruption

Memory Corruption is any vulnerability that allows the modification of the content of memory locations in a way not intended by the developer. Memory corruption results are inconsistent; they could lead to fatal errors and system crashes or data leakage; some have no effect at all.

CVE Additional Information

This product uses data from the NVD API but is not endorsed or certified by the NVD.
CVE-2024-38021
Loading description