News

Exploit Code Discovered for Unpatched IE Flaw

This week security researchers announced that exploit code taking advantage of an unpatched IE flaw has been published on the Web.

The code capitalizes on an IE error when encountering radio buttons using the "createTextRange()" method, allowing hackers to attack the visiting machine.

Microsoft issued a security advisory regarding the exploit Thursday.

"This vulnerability could allow an attacker to execute arbitrary code on the user's system in the security context of the logged-on user," a company spokesperson said. "Microsoft has determined that an attacker who exploits this vulnerability would have no way to force users to visit a malicious Web site… Instead, an attacker would have to persuade them to visit the Web site."

The advisory states that Redmond will decide soon whether to release a patch as part of its regular monthly schedule or provide an "out-of-cycle" security update.

Russ Cooper, director of risk intelligence publishing for the security firm Cybertust, said he doesn't think the exploit will warrant an out-of-cycle patch.

"What we have to look at is not the flaw and not the exploit code, but the actual risk to the user of being exploited by it," he commented. "The simple fact is that [these kinds of] exploits are not being abused in a way that affects a large group of people."

While many security research firms have rated the flaw "critical," Cooper countered that hackers' reliance on phishing e-mails for these types of attacks makes widespread infection extremely unlikely.

"People receive these e-mails multiple times a day, every day," he explained. "You're either duped by every one of them, or you don't go there."

"What security managers need to think about is whether [their] people are likely to stumble into the hole of these malicious sites. If they are, they've probably been infected already."

Cooper did say that a widespread outbreak could occur if hackers defaced popular Web sites with the code, but, historically, that scenario is extremely rare.

About the Author

Becky Nagel serves as vice president of AI for 1105 Media specializing in developing media, events and training for companies around AI and generative AI technology. She also regularly writes and reports on AI news, and is the founding editor of PureAI.com. She's the author of "ChatGPT Prompt 101 Guide for Business Users" and other popular AI resources with a real-world business perspective. She regularly speaks, writes and develops content around AI, generative AI and other business tech. She has a background in Web technology and B2B enterprise technology journalism.

Featured

  • Microsoft Dismantles RedVDS Cybercrime Marketplace Linked to $40M in Phishing Fraud

    In a coordinated action spanning the United States and the United Kingdom, Microsoft’s Digital Crimes Unit (DCU) and international law enforcement collaborators have taken down RedVDS, a subscription based cybercrime platform tied to an estimated $40 million in fraud losses in the U.S. since March 2025.

  • Sound Wave Illustration

    CrowdStrike's Acquisition of SGNL Aims to Strengthen Identity Security

    CrowdStrike signs definitive agreement to purchase SGNL, an identity security specialist, in a deal valued at about $740 million.

  • Microsoft Acquires Osmos, Automating Data Engineering inside Fabric

    In a strategic move to reduce time-consuming manual data preparation, Microsoft has acquired Seattle-based startup Osmos, specializing in agentic AI for data engineering.

  • Linux Foundation Unites Major Tech Firms to Launch Agentic AI Foundation

    The Linux Foundation today announced the creation of a new collaborative initiative — the Agentic AI Foundation (AAIF) — bringing together major AI and cloud players such as Microsoft, OpenAI, Anthropic and other major tech companies.