Critical security flaws found in Office Open XML signatures

Share post:

Researchers at Germany’s Ruhr University Bochum uncovered security flaws in Office Open XML (OOXML) signatures used in Microsoft Office and OnlyOffice. These weaknesses make it simple to spoof and fabricate Office files with false signatures.

The findings were presented in a paper titled “Every Signature is Broken” scheduled to be presented at the USENIX Security Symposium. These flaws were discovered in various versions of Microsoft Office for Windows and macOS, as well as in OnlyOffice Desktop for Windows, macOS, and Linux. Microsoft Office for macOS does not check document signatures, allowing an empty file to be added to an OOXML package and a fake security flag to be shown.

Simon Rohlmann, the lead author, criticized the use of partial signatures in OOXML, compromising information integrity and authenticity. He noted that other formats like ODF have resolved this issue effectively. He added that OOXML documents are vulnerable to manipulation. This is because they use partial signatures, which allow attackers to create forged signatures that appear to be from a trusted source. The vulnerabilities stem from three main issues: partial signatures, flaws in the rendering flow, and a complex cryptographic verification process.

Microsoft acknowledged the vulnerabilities, offered a bug bounty, but didn’t see an immediate need for action. OnlyOffice hasn’t responded since October 2022.

The sources for this piece include an article in TheRegister.

SUBSCRIBE NOW

Related articles

Trump Administration Officials Accidentally Text Journalist Secret U.S. War Plans

The Atlantic’s editor-in-chief Jeffrey Goldberg says he was mistakenly added to a Signal group chat discussing classified U.S....

Oracle Denies Breach After Hacker Claims to Have Stolen 6 Million Records

Oracle is denying claims that its cloud systems were breached after a hacker alleged they had stolen six...

Security Expert Troy Hunt’s Mailchimp Account Compromised in Phishing Attack

Troy Hunt, renowned information security expert and founder of HaveIBeenPwned, has reported a phishing attack that compromised his...

Synology Vulnerability Allows Remote Code Execution

A major security flaw in Synology's DiskStation Manager (DSM) software could allow remote attackers to take full control...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways