Aliases: No associated aliases
Microsoft Defender Antivirus detects and removes this threat.
This threat uses a maliciously-crafted Microsoft Office document to download additional payload. It can arrive on your device as spam email attachment, usually as a Word file (.doc).
An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then have to convince the potential victim to open the malicious document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Microsoft Defender Antivirus and Microsoft Defender for Endpoint both provide detection and protections for this known vulnerability. Keep your antimalware products up to date. Customers who utilize automatic updates do not need to take additional action. Enterprise customers who manage updates should select the detection build 1.349.22.0 or newer and deploy it across their environments. Microsoft Defender for Endpoint alerts will be displayed as: “Suspicious Cpl File Execution”.
To learn more about mitigating DDE attack scenarios, CVE-2021-40444 - Security Update Guide - Microsoft - Microsoft MSHTML Remote Code Execution Vulnerability
Guidance for end users
Guidance for enterprise administrators
Apply these mitigations to reduce the impact of this threat.