MHTML

Winsage
June 3, 2025
Microsoft is transforming its Windows 10 and Windows 11 platforms to comply with the European Union's Digital Markets Act (DMA), enhancing user autonomy for individuals in the European Economic Area (EEA). Beta testers in the EEA can now set a third-party browser as the default for more protocols and file types, including ftp, http, https, and various HTML-related formats. The default browser's icon will be pinned to the taskbar, and users can also set a default for handling PDF files. These updates are in the beta channel (Build 26120.4151) and will roll out to retail users by July. Microsoft Edge will not prompt users in Europe to set it as the default browser unless opened, and prompts to reinstall Edge will not appear if it is uninstalled, unless third-party PWAs are installed from the Microsoft Store. Additionally, users can see web search results from various search engines and can uninstall the Microsoft Store while still receiving updates for existing applications. These changes are exclusive to the EEA, with users in other regions remaining on traditional versions of the operating system.
Winsage
June 3, 2025
Microsoft is implementing changes in Windows 10 and Windows 11 for users in the European Economic Area (EEA) to address criticism regarding the promotion of Microsoft Edge. These changes, in response to the Digital Markets Act, include: - A broader range of link and file types will be included when users set their default browser via the “Set default” button, covering link types such as ftp, http, https, read, and file types like .htm, .html, .mht, .mhtml, .shtml, .svg, .xht, .xhtml, .xml. - The default browser will be pinned to the Taskbar unless users opt out. - Users can set the .pdf file type default for compatible browsers. - There will be fewer prompts to revert to Edge, and users will not receive reminders to reinstall Edge if it is uninstalled. - The Bing app will use the default web browser instead of defaulting to Edge. Additionally, enhancements to Windows Search will allow: - Apps to provide web search results directly within Windows Search. - Automatic enabling of web search providers upon app installation. - Viewing results from multiple web search providers simultaneously with scoping tabs for refined searches. - Reordering of web search providers in Settings. These updates are being rolled out in Windows Insider builds and are expected to reach retail versions by early June. It is uncertain if these changes will be extended to other regions.
Winsage
September 18, 2024
Microsoft has reclassified a bug from its September Patch Tuesday update as a zero-day vulnerability, designated CVE-2024-43461, which has been exploited by the threat group "Void Banshee" since before July. This vulnerability affects all supported versions of Windows and allows remote attackers to execute arbitrary code if a victim visits a malicious webpage or clicks an unsafe link. Initially rated 8.8 on the CVSS scale, Microsoft revised its assessment after discovering active exploitation linked to another vulnerability, CVE-2024-38112, which was patched in July 2024. To protect against CVE-2024-43461, Microsoft recommends applying patches from both the July and September updates. CISA added this flaw to its known exploited vulnerabilities database, setting an implementation deadline of October 7 for federal agencies. The vulnerability enables attackers to manipulate browser interfaces and has been used by Void Banshee to deploy Atlantida malware through deceptive files. The coordinated attack chain involving CVE-2024-43461 and CVE-2024-38112 exploits the legacy MSHTML engine, which remains in Windows for compatibility. A study indicated that over 10% of Windows 10 and 11 systems lack endpoint protection, increasing vulnerability to such exploits.
Winsage
July 23, 2024
- CVE-2024-38112 is a vulnerability in the Microsoft MSHTML platform, allowing for a spoofing attack using malicious MHTML files. - The vulnerability was addressed in the July 2024 Patch Tuesday release, but remains significant due to delayed updates, legacy systems, and evolving attack techniques. - The Void Banshee group has been actively exploiting this vulnerability to distribute the Atlantida info-stealer, emphasizing the importance of timely security updates and patch management.
Search