banner logoJoin us at RSAC™ 2026 Conference, March 23–March 26 | North Expo, Booth N-5863Join us at RSAC™ 2026, March 23–March 26Learn More
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      Digital Forensics, IRR & Breach Readiness
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-40444

CVE-2021-40444: Windows 10 MSHTML RCE Vulnerability

CVE-2021-40444 is a remote code execution vulnerability in Microsoft Windows MSHTML that enables attackers to exploit malicious Office documents. This article covers technical details, affected systems, and mitigation.

Published: March 4, 2026

CVE-2021-40444 Overview

CVE-2021-40444 is a remote code execution vulnerability in Microsoft MSHTML, the HTML rendering engine used by Microsoft Windows and Microsoft Office. This vulnerability allows attackers to craft malicious ActiveX controls embedded in Microsoft Office documents that can execute arbitrary code when the victim opens the document. The vulnerability has been actively exploited in targeted attacks using specially-crafted Office documents.

An attacker could leverage this vulnerability by creating a malicious ActiveX control and embedding it in a Microsoft Office document that uses the browser rendering engine. The attack requires user interaction—the victim must open the malicious document. Users with limited user rights on the system experience reduced impact compared to those operating with administrative privileges.

Critical Impact

This vulnerability enables remote code execution through malicious Office documents and has been actively exploited in the wild. It is listed in CISA's Known Exploited Vulnerabilities Catalog and requires immediate patching.

Affected Products

  • Microsoft Windows 10 (versions 1507, 1607, 1809, 1909, 2004, 20H2, 21H1)
  • Microsoft Windows 7 SP1
  • Microsoft Windows 8.1 and Windows RT 8.1
  • Microsoft Windows Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2
  • Microsoft Windows Server 2016, 2019, 2022
  • Microsoft Windows Server versions 2004 and 20H2

Discovery Timeline

  • September 14, 2021 - Microsoft releases security updates to address the vulnerability
  • September 15, 2021 - CVE-2021-40444 published to NVD
  • October 30, 2025 - Last updated in NVD database

Technical Details for CVE-2021-40444

Vulnerability Analysis

This vulnerability resides in MSHTML (also known as Trident), the proprietary browser engine for Internet Explorer that is also used by Microsoft Office applications for rendering HTML content. The flaw enables attackers to execute arbitrary code by exploiting how Office documents process embedded ActiveX controls through the MSHTML component.

The attack chain involves crafting a malicious Office document (typically Word documents with .docx extension) that contains a specially-crafted ActiveX control. When the victim opens the document, the MSHTML engine processes the embedded content, leading to remote code execution. Microsoft Defender Antivirus and Microsoft Defender for Endpoint detect exploitation attempts, displaying alerts as "Suspicious Cpl File Execution."

Root Cause

The vulnerability is classified under CWE-22 (Path Traversal), indicating that improper neutralization of special elements in path names allows attackers to bypass security controls. The MSHTML engine fails to properly validate and sanitize input when processing ActiveX controls embedded in Office documents, allowing malicious payloads to escape the intended security boundaries and execute arbitrary code on the victim's system.

Attack Vector

The attack requires local access in the sense that the user must open a malicious file, though the file itself can be delivered remotely via email, compromised websites, or file-sharing services. The exploitation process follows these steps:

  1. The attacker creates a malicious Office document containing a specially-crafted ActiveX control
  2. The document is delivered to the victim through phishing emails, malicious websites, or other social engineering techniques
  3. When the victim opens the document, Office invokes the MSHTML engine to render embedded HTML content
  4. The malicious ActiveX control executes, allowing the attacker to run arbitrary code with the victim's privileges
  5. If the user has administrative rights, the attacker gains full system control

The vulnerability does not require user authentication and exploits the trust relationship between Office applications and the MSHTML rendering engine.

Detection Methods for CVE-2021-40444

Indicators of Compromise

  • Suspicious Office documents containing embedded ActiveX controls or OLE objects with unusual external references
  • Process chains showing Office applications (WINWORD.EXE, EXCEL.EXE) spawning unexpected child processes
  • Network connections from Office applications to unknown or suspicious external URLs
  • Presence of .inf or .dll files in temporary directories following Office document access
  • Microsoft Defender alerts for "Suspicious Cpl File Execution"

Detection Strategies

  • Monitor for Office applications making unusual network connections or downloading executable content from external sources
  • Implement behavioral detection rules for Office processes spawning command interpreters (cmd.exe, powershell.exe) or other executables
  • Deploy Yara rules targeting malicious document structures with embedded ActiveX controls
  • Enable Microsoft Defender for Endpoint with detection build 1.349.22.0 or newer for known exploit patterns

Monitoring Recommendations

  • Configure endpoint detection and response (EDR) solutions to alert on suspicious Office document behavior
  • Monitor Windows Event Logs for unusual MSHTML and ActiveX-related activities
  • Implement network traffic analysis to detect command-and-control communications following document opening
  • Review Microsoft Defender alerts and ensure antimalware definitions are current

How to Mitigate CVE-2021-40444

Immediate Actions Required

  • Apply Microsoft security updates released on September 14, 2021, immediately for all affected Windows versions
  • Ensure Microsoft Defender Antivirus definitions are updated to build 1.349.22.0 or newer
  • Enable Protected View in Microsoft Office to prevent automatic execution of embedded content
  • Disable ActiveX controls in Microsoft Office applications where not required for business operations
  • Implement application control policies to restrict unauthorized code execution

Patch Information

Microsoft released security updates on September 14, 2021, to address this vulnerability. Organizations should consult the Microsoft Security Advisory CVE-2021-40444 for the specific update applicable to their Windows version. Automatic updates should apply the patches without additional action; enterprise environments managing updates manually should prioritize deployment immediately.

Workarounds

  • Disable the installation of all ActiveX controls in Internet Explorer by modifying the registry to prevent MSHTML from instantiating ActiveX controls
  • Configure Microsoft Office to open documents from the internet in Protected View by default
  • Implement email gateway filtering to block Office documents with embedded OLE objects from external sources
  • Use Microsoft Defender Application Guard to isolate potentially malicious documents
  • Restrict user permissions to run with least privilege, reducing the impact of successful exploitation
bash
# Registry modification to disable ActiveX controls in Internet Explorer
# Run these commands in an elevated command prompt to apply the workaround

reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0" /v 1001 /t REG_DWORD /d 3 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0" /v 1004 /t REG_DWORD /d 3 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1" /v 1001 /t REG_DWORD /d 3 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1" /v 1004 /t REG_DWORD /d 3 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2" /v 1001 /t REG_DWORD /d 3 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2" /v 1004 /t REG_DWORD /d 3 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3" /v 1001 /t REG_DWORD /d 3 /f
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3" /v 1004 /t REG_DWORD /d 3 /f

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechMicrosoft

  • SeverityHIGH

  • CVSS Score7.8

  • EPSS Probability94.33%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CISA KEV Information
  • In CISA KEVYes
  • CWE References
  • CWE-22
  • Technical References
  • Packet Storm MSHTML Overview

  • Packet Storm Word Remote Code Execution

  • Packet Storm MSDT Follina PoC

  • CISA Known Exploited Vulnerabilities CVE-2021-40444
  • Vendor Resources
  • Microsoft Security Advisory CVE-2021-40444
  • Related CVEs
  • CVE-2026-21536: Microsoft Devices Pricing RCE Vulnerability

  • CVE-2026-27848: MR9600/MX4200 RCE Vulnerability

  • CVE-2021-24105: Package Manager Configurations RCE Flaw

  • CVE-2026-21531: Azure Conversation Authoring RCE Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use