Microsoft issued an advisory that categorically stated that the security feature bypass bug allowed unauthorized threat actors to launch attacks. Vulnerable users have fallen victim to this unfortunate incident. 

Security threats

The attackers often trick their victims using malicious Excel documents. The attackers use the phishing email technique or fake websites to lure the victims into their trap.  This challenge is quite serious, it has actually been rated at 7.8 out of 10 by the Common Vulnerability Scoring System. The matter is of high priority and needs to be resolved immediately. 

No patch for Mac users

Microsoft released a patch for the Excel security threat on Windows devices. The patch was released during this month’s Patch Tuesday. However, Apple users are still in the dark. No solution has been found to resolve the security threat for them.  Apple indicated that users on Microsoft 365 with Mac devices will have to be patient. The patch is not yet available for use. They are yet to disclose why it is not available or when they will be releasing it.  It is also important to note that the security updates for Microsoft LTSC for Mac 2021 and Microsoft Office 2019 for Mac are not yet available.  However, the updates will be released as soon as possible. Once the updates are available users will be notified through a revision to the CVE information released. 

Extra precaution

As such, Windows users are urged to immediately update their Microsoft Excel installations to the latest build. This will protect them against the security threats.  On the other hand, Mac users are urged to be more careful especially when it comes to downloading of files from unknown sites and the receipt of suspicious emails. The users are encouraged to wait on the patch release.  As an extra layer of protection, users are encouraged to also install an antivirus onto their devices. It is also important to ensure that their devices have the latest software patches. Have you encountered any security threat yet? Let us know about your experience in the comment section below. 

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ