Understanding Microsoft Office Trusted Locations Workflow and How It Can Be Exploited - Pentestmag

Understanding Microsoft Office Trusted Locations Workflow and How It Can Be Exploited

Feb 21, 2023

by Adam Maraziti

Ronald Reagan once said, “Trust, but verify”.  That holds true even for Cybersecurity.  We are long past the days of relying on software companies to implement default settings with a security first focus.  It is on organizations to review administrative guides, default settings and various best practices to securely configure new and existing software.  Even then, some built-in functionality cannot be changed and organizations are forced to get creative with solutions to mitigate the associated risks.  Usually, this is more of an issue when a larger software company determines that a security concern is not great enough to warrant a patch or a change in functionality because the product, in most cases, is widely used in the industry, or it is working as intended (as determined by the software company).  One such company is Microsoft and its suite of Office products.

This article will speak about some advanced topics, however, the user should have enough information within the article to understand the core concepts utilized. The goal is to provide some information on the product, the functionality of the product, an in-depth look at how the software steps through the process, and how this is exploited, including a unique attack chain, and finally, some best practices an organization can utilize to prevent it.

Background Information

It is no secret that a very large portion of organizations utilize Microsoft Office products.  While there is....

March 1, 2023
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023