KB2553332: Windows Server Security Update (January 2019)
Microsoft MSHTML engine contains an improper input validation vulnerability that allows for remote code execution vulnerability.
A remote attacker, without authentication, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. Federal agencies are required to remediate by 2022-05-03 under CISA BOD 22-01.
This is a Command Injection (CWE-77) vulnerability in Microsoft MSHTML. A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input, aka "MSHTML Engine Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Office Word Viewer, Internet Explorer 9, Internet Explorer 11, Microsoft Excel Viewer, Internet Explorer 10, Office 365 ProPlus. Exploitation requires remote network access, low attack complexity, no authentication required, and user interaction required.
📧
Phishing link
🖼
Malicious file
🔓
Server compromised
Probably yes if any of these apply:
Active exploitation documented in the wild. Threat-research write-up: https://www.exploit-db.com/exploits/46536/
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB2553332Manual remediation steps
Apply the Microsoft Security Update
Microsoft has released an official security update that fixes this vulnerability.
Required KB Updates
Supersedes: KB4092433, KB4471318, KB4471320, KB4471321, KB4471325, KB4471330, KB4483187, KB4483228, KB4483229, KB4483232, KB4483234, KB4483235
Affected Products
Installation Methods
Windows Update (recommended)
Microsoft Update Catalog (manual download)
.msu installer with administrator privilegesWSUS / SCCM / Intune
Approve KB2553332 for the affected products in your update management console.
Microsoft Download Center Links
Verification
Confirm the update is installed:
Get-HotFix | Where-Object { $_.HotFixID -in @('KB2553332','KB2596760','KB3172522','KB4022162','KB4462112','KB4480116','KB4480961','KB4480962','KB4480963','KB4480965','KB4480966','KB4480968','KB4480970','KB4480973','KB4480975','KB4480978') }
References
Discovery Credit
Eduardo Braun Prado working with iDefense Labs
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.