CVE-2021-40444

ENISA EUVD: EUVD-2021-27621 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 13 articles Published: 2021-09-15

EPSS Score

Source: FIRST.org · 2026-05-23
94.33%
probability
This CVE has a 94.33% probability of being exploited in the next 30 days.
0% Top 100.0th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
8.8
HIGH
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
High
Availability
Low
Temporal
Exploit Code Maturity
Proof-of-Concept
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:P/RL:O/RC:C

CVSS v2 (legacy)

6.8
MEDIUM
Access Vector
Network
Access Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
AV:N/AC:M/Au:N/C:P/I:P/A:P

Description

NVD
<p>Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents.</p> <p>An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the user to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Microsoft Defender Antivirus and Microsoft Defender for Endpoint both provide detection and protections for the known vulnerability. Customers should keep antimalware products up to date. Customers who utilize automatic updates do not need to take additional action. Enterprise customers who manage updates should select the detection build 1.349.22.0 or newer and deploy it across their environments. Microsoft Defender for Endpoint alerts will be displayed as: “Suspicious Cpl File Execution”.</p> <p>Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.</p> <p>Please see the <strong>Mitigations</strong> and <strong>Workaround</strong> sections for important information about steps you can take to protect your system from this vulnerability.</p> <p><strong>UPDATE</strong> September 14, 2021: Microsoft has released security updates to address this vulnerability. Please see the Security Updates table for the applicable update for your system. We recommend that you install these updates immediately. Please see the FAQ for important information about which updates are applicable to your system.</p>

Affected Products

Microsoft
Windows 10 Version 1809
10.0.0
Microsoft
Windows Server 2019
10.0.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.0
Microsoft
Windows 10 Version 1909
10.0.0
Microsoft
Windows 10 Version 21H1
10.0.0

Attack Intelligence

Google Project Zero

Patched
Sept. 14, 2021
Reported by
Rick Cole (MSTIC), Dhanesh Kizhakkinan of Mandiant, Genwei Jiang of Mandiant, Haifei Li of EXPMON, and Byce Abdo of Mandiant
Root Cause Analysis
???

Exploits & PoC

lockedbyte/CVE-2021-40444

CVE-2021-40444 PoC

1734 2021-12-25
klezVirus/CVE-2021-40444

CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit

822 2023-10-11
aslitsecurity/CVE-2021-40444_builders

This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit

168 2021-10-11
Edubr2020/CVE-2021-40444--CABless

Modified code so that we don´t need to rely on CAB archives

102 2021-09-22
ozergoker/CVE-2021-40444

Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444

16 2021-09-29
mansk1es/Caboom

A malicious .cab creation tool for CVE-2021-40444

11 2021-09-12
kagura-maru/CVE-2021-40444-POC

An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.

9 2021-10-31
DarkSprings/CVE-2021-40444

CVE-2021-40444 POC

7 2021-09-09
LazarusReborn/Docx-Exploit-2021

This docx exploit uses res files inside Microsoft .docx file to execute malicious files. This exploit is related to CVE-2021-40444

5 2021-09-29
bambooqj/CVE-2021-40444_EXP_JS

根据已知样本反编译代码

2 2021-09-09
MRacumen/CVE-2021-40444

Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit

2 2021-12-28
k4k4/CVE-2021-40444-Sample

CVE-2021-40444 Sample

1 2021-09-10
khoaduynu/CVE-2021-40444

POC for CVE-2021-40444

1 2021-09-13
Zeop-CyberSec/word_mshtml

Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444.

1 2021-11-09
jamesrep/cve-2021-40444

Reverse engineering the "A Letter Before Court 4.docx" malicious files exploting cve-2021-40444

0 2021-09-12
Jeromeyoung/MSHTMHell

Malicious document builder for CVE-2021-40444

0 2021-09-14
kal1gh0st/CVE-2021-40444_CAB_archives

CVE 2021 40444 Windows Exploit services.dll

0 2021-10-21
Jeromeyoung/TIC4301_Project

TIC4301 Project - CVE-2021-40444

0 2021-10-16
basim-ahmad/Follina-CVE-and-CVE-2021-40444

This repository contains scripts and resources for exploiting the Follina CVE and CVE-2021-40444 vulnerabilities in Microsoft Office. The scripts gene

0 2024-07-29
35 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
92%
EPSS 94.33%
CVSS v3.1 8.8
Mentions 13
Last Seen Feb 25, 2025

CNA Information

CNA Assigner
microsoft
CNA Title
Microsoft MSHTML Remote Code Execution Vulnerability

Analyst Note

CVE-2021-40444 is a confirmed MSHTML remote code execution vulnerability with high CVSS score (8.8) that Microsoft officially acknowledged with evidence of active exploitation in the wild through malicious Office documents. The vulnerability was reported by Google Project Zero and covered by reputable security media, with documented targeted attacks occurring before public disclosure, establishing strong confirmation of both existence and real-world exploitation.

Threat Actors 21

MuddyWater
apt_group Information theft and espionage 🇮🇷 IR
Turla Group
apt_group Information theft and espionage Russian Federation
APT 29
apt_group Information theft and espionage 🇷🇺 RU
DarkHotel
apt_group Information theft and espionage 🇰🇷 KR
Kimsuky
apt_group Information theft and espionage 🇰🇷 KR
SaintBear
apt_group Information theft and espionage 🇷🇺 RU
CHRYSENE
apt_group Information theft and espionage 🇮🇷 IR
Harvester
apt_group Information theft and espionage Unknown
FusionCore
apt_group 🇪🇺 EU
MAGNALLIUM
apt_group Sabotage and destruction 🇮🇷 IR
DNSpionage
apt_group Information theft and espionage 🇮🇷 IR
ELECTRUM
apt_group Information theft and espionage 🇷🇺 RU
VICEROY TIGER
apt_group Information theft and espionage 🇮🇳 IN
TA413
apt_group Information theft and espionage 🇨🇳 CN
RomCom
apt_group Financial gain 🇷🇺 RU
Fox Kitten
apt_group Information theft and espionage 🇮🇷 IR
GreenCharlie
apt_group Information theft and espionage 🇮🇷 IR
Void Banshee
apt_group unknown
TRACER KITTEN
apt_group Information theft and espionage 🇮🇷 IR
WildPressure
apt_group Information theft and espionage UNKNOWN
Ferocious Kitten
apt_group Information theft and espionage 🇮🇷 IR

Triage Info

Decided atMar 03, 2026
Published DateSep 15, 2021