Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Microsoft: I have made Notepad✨

Microsoft: I have made Notepad✨

Scheduled Pinned Locked Moved Uncategorized
23 Posts 13 Posters 6 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • tess@mastodon.socialT tess@mastodon.social

    Microsoft: I have made Notepad✨

    Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

    favicon

    (www.cve.org)

    S This user is from outside of this forum
    S This user is from outside of this forum
    slotos@toot.community
    wrote last edited by
    #3

    @tess

    > How could an attacker exploit this vulnerability?
    >
    > An attacker could _trick a user into clicking a malicious link_ inside a Markdown file opened in Notepad, causing the application to launch unverified protocols that load and execute remote files.

    That’s not an RCE, is it?

    heretochewgum@fosstodon.orgH x0@dragonscave.spaceX 2 Replies Last reply
    0
    • S slotos@toot.community

      @tess

      > How could an attacker exploit this vulnerability?
      >
      > An attacker could _trick a user into clicking a malicious link_ inside a Markdown file opened in Notepad, causing the application to launch unverified protocols that load and execute remote files.

      That’s not an RCE, is it?

      heretochewgum@fosstodon.orgH This user is from outside of this forum
      heretochewgum@fosstodon.orgH This user is from outside of this forum
      heretochewgum@fosstodon.org
      wrote last edited by
      #4

      @slotos @tess

      CNA: Microsoft Corporation.
      Published: 2026-02-10
      Updated: 2026-02-11

      Title: Windows Notepad App Remote Code Execution Vulnerability
      Description

      Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network

      S 1 Reply Last reply
      0
      • heretochewgum@fosstodon.orgH heretochewgum@fosstodon.org

        @slotos @tess

        CNA: Microsoft Corporation.
        Published: 2026-02-10
        Updated: 2026-02-11

        Title: Windows Notepad App Remote Code Execution Vulnerability
        Description

        Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network

        S This user is from outside of this forum
        S This user is from outside of this forum
        slotos@toot.community
        wrote last edited by
        #5

        @HereToChewGum Read the details. There’s no remote execution capability, but rather a user can be tricked into executing code from a remote source.

        RCE, as I understand it, doesn’t involve user interaction. This is an ACE, but not an RCE.

        heretochewgum@fosstodon.orgH 1 Reply Last reply
        0
        • S slotos@toot.community

          @HereToChewGum Read the details. There’s no remote execution capability, but rather a user can be tricked into executing code from a remote source.

          RCE, as I understand it, doesn’t involve user interaction. This is an ACE, but not an RCE.

          heretochewgum@fosstodon.orgH This user is from outside of this forum
          heretochewgum@fosstodon.orgH This user is from outside of this forum
          heretochewgum@fosstodon.org
          wrote last edited by
          #6

          @slotos

          The ability to trigger arbitrary code execution (ACE) over a network (especially via a wide-area network such as the Internet) is often referred to as remote code execution (RCE or RCX). (Wikipedia)

          S 1 Reply Last reply
          0
          • heretochewgum@fosstodon.orgH heretochewgum@fosstodon.org

            @slotos

            The ability to trigger arbitrary code execution (ACE) over a network (especially via a wide-area network such as the Internet) is often referred to as remote code execution (RCE or RCX). (Wikipedia)

            S This user is from outside of this forum
            S This user is from outside of this forum
            slotos@toot.community
            wrote last edited by
            #7

            @HereToChewGum

            It’s not triggered over the network. Read the fine print!

            Are you using Grok to talk to me or something?

            heretochewgum@fosstodon.orgH 1 Reply Last reply
            0
            • S slotos@toot.community

              @HereToChewGum

              It’s not triggered over the network. Read the fine print!

              Are you using Grok to talk to me or something?

              heretochewgum@fosstodon.orgH This user is from outside of this forum
              heretochewgum@fosstodon.orgH This user is from outside of this forum
              heretochewgum@fosstodon.org
              wrote last edited by
              #8

              @slotos

              I was hoping you would explain what you mean. It is possible that having read the fine print I misunderstood or simpy missed something.

              MS describes it as a remote code execution vulnerability.

              So maybe you could explain why they are wrong.

              Hopefully being able to do that without being insulting is within the apparently limited scope of your social interaction ability?

              S 1 Reply Last reply
              0
              • R relay@relay.an.exchange shared this topic
              • heretochewgum@fosstodon.orgH heretochewgum@fosstodon.org

                @slotos

                I was hoping you would explain what you mean. It is possible that having read the fine print I misunderstood or simpy missed something.

                MS describes it as a remote code execution vulnerability.

                So maybe you could explain why they are wrong.

                Hopefully being able to do that without being insulting is within the apparently limited scope of your social interaction ability?

                S This user is from outside of this forum
                S This user is from outside of this forum
                slotos@toot.community
                wrote last edited by
                #9

                @HereToChewGum If you want an explanation, bloody ask for one. Quoting text your interlocutor went through is a passive aggressive insult at best.

                Especially given how you evidently didn’t put even a shred of effort into reading the damn CVE and its sources yourself.

                ipaschke@cyberplace.socialI 1 Reply Last reply
                0
                • tess@mastodon.socialT tess@mastodon.social

                  Microsoft: I have made Notepad✨

                  Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                  favicon

                  (www.cve.org)

                  kcarruthers@infosec.exchangeK This user is from outside of this forum
                  kcarruthers@infosec.exchangeK This user is from outside of this forum
                  kcarruthers@infosec.exchange
                  wrote last edited by
                  #10

                  @tess 🤣🙀🤦‍♀️

                  1 Reply Last reply
                  0
                  • pixelate@tweesecake.socialP pixelate@tweesecake.social shared this topic
                  • tess@mastodon.socialT tess@mastodon.social

                    Microsoft: I have made Notepad✨

                    Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                    favicon

                    (www.cve.org)

                    0x00string@infosec.exchange0 This user is from outside of this forum
                    0x00string@infosec.exchange0 This user is from outside of this forum
                    0x00string@infosec.exchange
                    wrote last edited by
                    #11

                    @tess its a local client-side bug, not an rce, so really you can also mock them for doing some 15yo bug embellishment shit too

                    jpsays@mastodon.socialJ 1 Reply Last reply
                    1
                    0
                    • R relay@relay.infosec.exchange shared this topic
                    • S slotos@toot.community

                      @HereToChewGum If you want an explanation, bloody ask for one. Quoting text your interlocutor went through is a passive aggressive insult at best.

                      Especially given how you evidently didn’t put even a shred of effort into reading the damn CVE and its sources yourself.

                      ipaschke@cyberplace.socialI This user is from outside of this forum
                      ipaschke@cyberplace.socialI This user is from outside of this forum
                      ipaschke@cyberplace.social
                      wrote last edited by
                      #12

                      @slotos @HereToChewGum@fosstodon.org Which CVE do you mean exactly? The one titled "Windows Notepad App Remote Code Execution Vulnerability"? 🤡

                      S 1 Reply Last reply
                      0
                      • tess@mastodon.socialT tess@mastodon.social

                        Microsoft: I have made Notepad✨

                        Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                        favicon

                        (www.cve.org)

                        afx@infosec.exchangeA This user is from outside of this forum
                        afx@infosec.exchangeA This user is from outside of this forum
                        afx@infosec.exchange
                        wrote last edited by
                        #13

                        @tess I strongly object to the term "perfectly good".

                        1 Reply Last reply
                        0
                        • tess@mastodon.socialT tess@mastodon.social

                          Microsoft: I have made Notepad✨

                          Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                          favicon

                          (www.cve.org)

                          bretthaines@infosec.exchangeB This user is from outside of this forum
                          bretthaines@infosec.exchangeB This user is from outside of this forum
                          bretthaines@infosec.exchange
                          wrote last edited by
                          #14

                          @tess
                          "RCE in notepad.exe"

                          Oh, you mean you opened notepad to demonstrate your RCE?

                          "NO, RCE IN NOTEPAD.EXE"

                          ಠ⁠_⁠ಠ

                          1 Reply Last reply
                          0
                          • S slotos@toot.community

                            @tess

                            > How could an attacker exploit this vulnerability?
                            >
                            > An attacker could _trick a user into clicking a malicious link_ inside a Markdown file opened in Notepad, causing the application to launch unverified protocols that load and execute remote files.

                            That’s not an RCE, is it?

                            x0@dragonscave.spaceX This user is from outside of this forum
                            x0@dragonscave.spaceX This user is from outside of this forum
                            x0@dragonscave.space
                            wrote last edited by
                            #15

                            @slotos @tess If I understand that text correctly, though not a security researcher, when they speak of unverified protocols and permission as that user they might be talking about Windows internal system protocols that can do things like change settings, not just basic shit like HTTP yeah? Or am I reading that wrong?

                            S 1 Reply Last reply
                            0
                            • ipaschke@cyberplace.socialI ipaschke@cyberplace.social

                              @slotos @HereToChewGum@fosstodon.org Which CVE do you mean exactly? The one titled "Windows Notepad App Remote Code Execution Vulnerability"? 🤡

                              S This user is from outside of this forum
                              S This user is from outside of this forum
                              slotos@toot.community
                              wrote last edited by
                              #16

                              @ipaschke Sure bud, now demonstrate an RCE scenario using this vulnerability.

                              Asking user to paste a text into an app and then click a certain part of it does not constitute an RCE. But what do I know, I’m not an infosec person, I just read what’s written and follow available sources.

                              1 Reply Last reply
                              0
                              • x0@dragonscave.spaceX x0@dragonscave.space

                                @slotos @tess If I understand that text correctly, though not a security researcher, when they speak of unverified protocols and permission as that user they might be talking about Windows internal system protocols that can do things like change settings, not just basic shit like HTTP yeah? Or am I reading that wrong?

                                S This user is from outside of this forum
                                S This user is from outside of this forum
                                slotos@toot.community
                                wrote last edited by
                                #17

                                @x0 If other discussions around this are to be trusted, its using ShellExecute. So probably yes.

                                All in all, don’t click on interactive elements in random files opened in notepad.

                                1 Reply Last reply
                                0
                                • tess@mastodon.socialT tess@mastodon.social

                                  Microsoft: I have made Notepad✨

                                  Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                                  favicon

                                  (www.cve.org)

                                  dat@social.g33ky.deD This user is from outside of this forum
                                  dat@social.g33ky.deD This user is from outside of this forum
                                  dat@social.g33ky.de
                                  wrote last edited by
                                  #18
                                  @tess would never call it "good", but your point still stands
                                  1 Reply Last reply
                                  0
                                  • tess@mastodon.socialT tess@mastodon.social

                                    Microsoft: I have made Notepad✨

                                    Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                                    favicon

                                    (www.cve.org)

                                    vampirdaddy@chaos.socialV This user is from outside of this forum
                                    vampirdaddy@chaos.socialV This user is from outside of this forum
                                    vampirdaddy@chaos.social
                                    wrote last edited by
                                    #19

                                    @tess
                                    they basically added a notepad:// handler that was string concatenated to a system call, like basic SQL-injections.
                                    So a markdown file with (simplified)

                                    notepad://test.txt && c:\path\to\malware.exe

                                    passed that to cmd.exe for execution.

                                    The fix calls notepad.exe directly with passed-on param string.

                                    1 Reply Last reply
                                    0
                                    • 0x00string@infosec.exchange0 0x00string@infosec.exchange

                                      @tess its a local client-side bug, not an rce, so really you can also mock them for doing some 15yo bug embellishment shit too

                                      jpsays@mastodon.socialJ This user is from outside of this forum
                                      jpsays@mastodon.socialJ This user is from outside of this forum
                                      jpsays@mastodon.social
                                      wrote last edited by
                                      #20

                                      @0x00string @tess I have had personal experience with msrc liberally applying rce as well.

                                      I get their argument. Because it can be triggered by a user clicking on a link to open remote content, they classify that as rce.

                                      Pretty much any pattern where a user can be coerced remotely will likely get an rce tag is my guess.

                                      But it does mean that other patterns of passive listening vulnerabilities can get watered down.

                                      0x00string@infosec.exchange0 1 Reply Last reply
                                      0
                                      • jpsays@mastodon.socialJ jpsays@mastodon.social

                                        @0x00string @tess I have had personal experience with msrc liberally applying rce as well.

                                        I get their argument. Because it can be triggered by a user clicking on a link to open remote content, they classify that as rce.

                                        Pretty much any pattern where a user can be coerced remotely will likely get an rce tag is my guess.

                                        But it does mean that other patterns of passive listening vulnerabilities can get watered down.

                                        0x00string@infosec.exchange0 This user is from outside of this forum
                                        0x00string@infosec.exchange0 This user is from outside of this forum
                                        0x00string@infosec.exchange
                                        wrote last edited by
                                        #21

                                        @jpsays @tess phone calls are rce

                                        0x00string@infosec.exchange0 1 Reply Last reply
                                        0
                                        • 0x00string@infosec.exchange0 0x00string@infosec.exchange

                                          @jpsays @tess phone calls are rce

                                          0x00string@infosec.exchange0 This user is from outside of this forum
                                          0x00string@infosec.exchange0 This user is from outside of this forum
                                          0x00string@infosec.exchange
                                          wrote last edited by
                                          #22

                                          @jpsays @tess sending a persuasive letter is rce

                                          0x00string@infosec.exchange0 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups