Microsoft Warns of New Internet Explorer Zero-Day Attack

In a security advisory released Wednesday, Microsoft warned users of Internet Explorer vulnerability that could allow remote code execution by hackers. The security breach can be accessed on XP, Vista, and Windows 7 systems running Internet Explorer 6, 7, and 8.

According to the advisory, "The vulnerability exists due to an invalid flag reference within Internet Explorer. It is possible under certain conditions for the invalid flag reference to be accessed after an object is deleted. In a specially crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution."

In the event the vulnerability were exploited, hackers would be able to hijack a target's computer to access a network system and install additional malware.

Microsoft stated that it is working on a fix and has suggested a workaround for the possible breach, which can be found here.  

In a blog entry discussing to the vulnerability, Jerry Bryant, group manager of response communications in the Microsoft Trustworthy Computing Group, said that Microsoft acted quickly when the malicious code had been pinpointed to a single Web site. "When a Web site is discovered to host malicious software, we work through legal channels to take the site down," wrote Bryant. "These kinds of attempts to exploit systems and the people using technology are the activity of criminals. Microsoft takes this very seriously and where possible, we will take legal action against those responsible."

In addition to the workaround provided by Microsoft, Bryant suggested that all applicable software be up-to-date and that firewalls, anti-spyware, and anti-virus programs be up and running.  

About the Author

Chris Paoli (@ChrisPaoli5) is the associate editor for Converge360.

Featured

  • open laptop in a college classroom with holographic AI icons like a brain and data charts rising from the screen

    4 Ways Universities Are Using Google AI Tools for Learning and Administration

    In a recent blog post, Google shared an array of education customer stories, showcasing ways institutions are using AI tools like Gemini and NotebookLM to transform both learning and administrative tasks.

  • illustration of a human head with a glowing neural network in the brain, connected to tech icons on a cool blue-gray background

    Meta Launches Stand-Alone AI App

    Meta Platforms has introduced a stand-alone artificial intelligence app built on its proprietary Llama 4 model, intensifying the competitive race in generative AI alongside OpenAI, Google, Anthropic, and xAI.

  • three main icons—a cloud, a user profile, and a padlock—connected by circuit lines on a blue abstract background

    Report: Identity Has Become a Critical Security Perimeter for Cloud Services

    A new threat landscape report points to new cloud vulnerabilities. According to the 2025 Global Threat Landscape Report from Fortinet, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.

  • Stylized illustration showing cybersecurity elements like shields, padlocks, and secure cloud icons on a neutral, minimalist digital background

    Microsoft Announces Security Advancements

    Microsoft has announced major security advancements across its product portfolio and practices. The work is part of its Secure Future Initiative (SFI), a multiyear cybersecurity transformation the company calls the largest engineering project in company history.