Microsoft has warned that hackers may already be exploiting a new vulnerability found in the company’s Word and Office programs. The warning comes just after the company issued fixes for 20 other bugs in its products on Tuesday, including six for Word.The latest problem affects Office 2000 and Office XP, Microsoft said in a security advisory on Wednesday. Attackers could create a specially crafted Word document that, if opened, could allow them to control a victim’s computer remotely. As usual, the company advised great caution when opening unsolicited attachments.Microsoft said it had received reports of “very limited, targeted” attacks. Danish security vendor Secunia ranked the problem as “extremely critical.”The emergence of a security bug so soon after Microsoft’s scheduled patch release follows a familiar pattern by hackers, who want to maximize the amount of time they have to take advantage of a vulnerability, said Thomas Kristensen, Secunia’s chief technical officer. Microsoft rarely diverts from its patch schedule, set for the second Tuesday of the month, although it said it would in this case if it considers it necessary.Office applications such as Word are “low-hanging fruit” for hackers, since the programs haven’t been audited as much as some others, such as Internet Explorer, Kristensen said.The hackers find a vulnerability by manipulating a document and testing how Word reads it. In this case, a modified document can corrupt system memory in a way that allows the attacker to execute code on the machine remotely. As well as sending the document via e-mail, the hacker could embed it in a webpage and try to lure users into visiting that page.”Attacking using this vector is fairly easy,” Kristensen said.However, new security features in Windows Vista, released to the general public last month, may prevent similar types of attack, so hackers may be making an extra effort to exploit them while they can, he said. —Jeremy Kirk, IDG News Service (London Bureau) Related content brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe