Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Microsoft: I have made Notepad✨

Microsoft: I have made Notepad✨

Scheduled Pinned Locked Moved Uncategorized
23 Posts 13 Posters 6 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S slotos@toot.community

    @tess

    > How could an attacker exploit this vulnerability?
    >
    > An attacker could _trick a user into clicking a malicious link_ inside a Markdown file opened in Notepad, causing the application to launch unverified protocols that load and execute remote files.

    That’s not an RCE, is it?

    heretochewgum@fosstodon.orgH This user is from outside of this forum
    heretochewgum@fosstodon.orgH This user is from outside of this forum
    heretochewgum@fosstodon.org
    wrote last edited by
    #4

    @slotos @tess

    CNA: Microsoft Corporation.
    Published: 2026-02-10
    Updated: 2026-02-11

    Title: Windows Notepad App Remote Code Execution Vulnerability
    Description

    Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network

    S 1 Reply Last reply
    0
    • heretochewgum@fosstodon.orgH heretochewgum@fosstodon.org

      @slotos @tess

      CNA: Microsoft Corporation.
      Published: 2026-02-10
      Updated: 2026-02-11

      Title: Windows Notepad App Remote Code Execution Vulnerability
      Description

      Improper neutralization of special elements used in a command ('command injection') in Windows Notepad App allows an unauthorized attacker to execute code over a network

      S This user is from outside of this forum
      S This user is from outside of this forum
      slotos@toot.community
      wrote last edited by
      #5

      @HereToChewGum Read the details. There’s no remote execution capability, but rather a user can be tricked into executing code from a remote source.

      RCE, as I understand it, doesn’t involve user interaction. This is an ACE, but not an RCE.

      heretochewgum@fosstodon.orgH 1 Reply Last reply
      0
      • S slotos@toot.community

        @HereToChewGum Read the details. There’s no remote execution capability, but rather a user can be tricked into executing code from a remote source.

        RCE, as I understand it, doesn’t involve user interaction. This is an ACE, but not an RCE.

        heretochewgum@fosstodon.orgH This user is from outside of this forum
        heretochewgum@fosstodon.orgH This user is from outside of this forum
        heretochewgum@fosstodon.org
        wrote last edited by
        #6

        @slotos

        The ability to trigger arbitrary code execution (ACE) over a network (especially via a wide-area network such as the Internet) is often referred to as remote code execution (RCE or RCX). (Wikipedia)

        S 1 Reply Last reply
        0
        • heretochewgum@fosstodon.orgH heretochewgum@fosstodon.org

          @slotos

          The ability to trigger arbitrary code execution (ACE) over a network (especially via a wide-area network such as the Internet) is often referred to as remote code execution (RCE or RCX). (Wikipedia)

          S This user is from outside of this forum
          S This user is from outside of this forum
          slotos@toot.community
          wrote last edited by
          #7

          @HereToChewGum

          It’s not triggered over the network. Read the fine print!

          Are you using Grok to talk to me or something?

          heretochewgum@fosstodon.orgH 1 Reply Last reply
          0
          • S slotos@toot.community

            @HereToChewGum

            It’s not triggered over the network. Read the fine print!

            Are you using Grok to talk to me or something?

            heretochewgum@fosstodon.orgH This user is from outside of this forum
            heretochewgum@fosstodon.orgH This user is from outside of this forum
            heretochewgum@fosstodon.org
            wrote last edited by
            #8

            @slotos

            I was hoping you would explain what you mean. It is possible that having read the fine print I misunderstood or simpy missed something.

            MS describes it as a remote code execution vulnerability.

            So maybe you could explain why they are wrong.

            Hopefully being able to do that without being insulting is within the apparently limited scope of your social interaction ability?

            S 1 Reply Last reply
            0
            • R relay@relay.an.exchange shared this topic
            • heretochewgum@fosstodon.orgH heretochewgum@fosstodon.org

              @slotos

              I was hoping you would explain what you mean. It is possible that having read the fine print I misunderstood or simpy missed something.

              MS describes it as a remote code execution vulnerability.

              So maybe you could explain why they are wrong.

              Hopefully being able to do that without being insulting is within the apparently limited scope of your social interaction ability?

              S This user is from outside of this forum
              S This user is from outside of this forum
              slotos@toot.community
              wrote last edited by
              #9

              @HereToChewGum If you want an explanation, bloody ask for one. Quoting text your interlocutor went through is a passive aggressive insult at best.

              Especially given how you evidently didn’t put even a shred of effort into reading the damn CVE and its sources yourself.

              ipaschke@cyberplace.socialI 1 Reply Last reply
              0
              • tess@mastodon.socialT tess@mastodon.social

                Microsoft: I have made Notepad✨

                Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                favicon

                (www.cve.org)

                kcarruthers@infosec.exchangeK This user is from outside of this forum
                kcarruthers@infosec.exchangeK This user is from outside of this forum
                kcarruthers@infosec.exchange
                wrote last edited by
                #10

                @tess 🤣🙀🤦‍♀️

                1 Reply Last reply
                0
                • pixelate@tweesecake.socialP pixelate@tweesecake.social shared this topic
                • tess@mastodon.socialT tess@mastodon.social

                  Microsoft: I have made Notepad✨

                  Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                  favicon

                  (www.cve.org)

                  0x00string@infosec.exchange0 This user is from outside of this forum
                  0x00string@infosec.exchange0 This user is from outside of this forum
                  0x00string@infosec.exchange
                  wrote last edited by
                  #11

                  @tess its a local client-side bug, not an rce, so really you can also mock them for doing some 15yo bug embellishment shit too

                  jpsays@mastodon.socialJ 1 Reply Last reply
                  1
                  0
                  • R relay@relay.infosec.exchange shared this topic
                  • S slotos@toot.community

                    @HereToChewGum If you want an explanation, bloody ask for one. Quoting text your interlocutor went through is a passive aggressive insult at best.

                    Especially given how you evidently didn’t put even a shred of effort into reading the damn CVE and its sources yourself.

                    ipaschke@cyberplace.socialI This user is from outside of this forum
                    ipaschke@cyberplace.socialI This user is from outside of this forum
                    ipaschke@cyberplace.social
                    wrote last edited by
                    #12

                    @slotos @HereToChewGum@fosstodon.org Which CVE do you mean exactly? The one titled "Windows Notepad App Remote Code Execution Vulnerability"? 🤡

                    S 1 Reply Last reply
                    0
                    • tess@mastodon.socialT tess@mastodon.social

                      Microsoft: I have made Notepad✨

                      Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                      favicon

                      (www.cve.org)

                      afx@infosec.exchangeA This user is from outside of this forum
                      afx@infosec.exchangeA This user is from outside of this forum
                      afx@infosec.exchange
                      wrote last edited by
                      #13

                      @tess I strongly object to the term "perfectly good".

                      1 Reply Last reply
                      0
                      • tess@mastodon.socialT tess@mastodon.social

                        Microsoft: I have made Notepad✨

                        Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                        favicon

                        (www.cve.org)

                        bretthaines@infosec.exchangeB This user is from outside of this forum
                        bretthaines@infosec.exchangeB This user is from outside of this forum
                        bretthaines@infosec.exchange
                        wrote last edited by
                        #14

                        @tess
                        "RCE in notepad.exe"

                        Oh, you mean you opened notepad to demonstrate your RCE?

                        "NO, RCE IN NOTEPAD.EXE"

                        ಠ⁠_⁠ಠ

                        1 Reply Last reply
                        0
                        • S slotos@toot.community

                          @tess

                          > How could an attacker exploit this vulnerability?
                          >
                          > An attacker could _trick a user into clicking a malicious link_ inside a Markdown file opened in Notepad, causing the application to launch unverified protocols that load and execute remote files.

                          That’s not an RCE, is it?

                          x0@dragonscave.spaceX This user is from outside of this forum
                          x0@dragonscave.spaceX This user is from outside of this forum
                          x0@dragonscave.space
                          wrote last edited by
                          #15

                          @slotos @tess If I understand that text correctly, though not a security researcher, when they speak of unverified protocols and permission as that user they might be talking about Windows internal system protocols that can do things like change settings, not just basic shit like HTTP yeah? Or am I reading that wrong?

                          S 1 Reply Last reply
                          0
                          • ipaschke@cyberplace.socialI ipaschke@cyberplace.social

                            @slotos @HereToChewGum@fosstodon.org Which CVE do you mean exactly? The one titled "Windows Notepad App Remote Code Execution Vulnerability"? 🤡

                            S This user is from outside of this forum
                            S This user is from outside of this forum
                            slotos@toot.community
                            wrote last edited by
                            #16

                            @ipaschke Sure bud, now demonstrate an RCE scenario using this vulnerability.

                            Asking user to paste a text into an app and then click a certain part of it does not constitute an RCE. But what do I know, I’m not an infosec person, I just read what’s written and follow available sources.

                            1 Reply Last reply
                            0
                            • x0@dragonscave.spaceX x0@dragonscave.space

                              @slotos @tess If I understand that text correctly, though not a security researcher, when they speak of unverified protocols and permission as that user they might be talking about Windows internal system protocols that can do things like change settings, not just basic shit like HTTP yeah? Or am I reading that wrong?

                              S This user is from outside of this forum
                              S This user is from outside of this forum
                              slotos@toot.community
                              wrote last edited by
                              #17

                              @x0 If other discussions around this are to be trusted, its using ShellExecute. So probably yes.

                              All in all, don’t click on interactive elements in random files opened in notepad.

                              1 Reply Last reply
                              0
                              • tess@mastodon.socialT tess@mastodon.social

                                Microsoft: I have made Notepad✨

                                Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                                favicon

                                (www.cve.org)

                                dat@social.g33ky.deD This user is from outside of this forum
                                dat@social.g33ky.deD This user is from outside of this forum
                                dat@social.g33ky.de
                                wrote last edited by
                                #18
                                @tess would never call it "good", but your point still stands
                                1 Reply Last reply
                                0
                                • tess@mastodon.socialT tess@mastodon.social

                                  Microsoft: I have made Notepad✨

                                  Security researchers: You fucked up a perfectly good plaintext editor is what you did. Look at it. It's got RCEs.

                                  favicon

                                  (www.cve.org)

                                  vampirdaddy@chaos.socialV This user is from outside of this forum
                                  vampirdaddy@chaos.socialV This user is from outside of this forum
                                  vampirdaddy@chaos.social
                                  wrote last edited by
                                  #19

                                  @tess
                                  they basically added a notepad:// handler that was string concatenated to a system call, like basic SQL-injections.
                                  So a markdown file with (simplified)

                                  notepad://test.txt && c:\path\to\malware.exe

                                  passed that to cmd.exe for execution.

                                  The fix calls notepad.exe directly with passed-on param string.

                                  1 Reply Last reply
                                  0
                                  • 0x00string@infosec.exchange0 0x00string@infosec.exchange

                                    @tess its a local client-side bug, not an rce, so really you can also mock them for doing some 15yo bug embellishment shit too

                                    jpsays@mastodon.socialJ This user is from outside of this forum
                                    jpsays@mastodon.socialJ This user is from outside of this forum
                                    jpsays@mastodon.social
                                    wrote last edited by
                                    #20

                                    @0x00string @tess I have had personal experience with msrc liberally applying rce as well.

                                    I get their argument. Because it can be triggered by a user clicking on a link to open remote content, they classify that as rce.

                                    Pretty much any pattern where a user can be coerced remotely will likely get an rce tag is my guess.

                                    But it does mean that other patterns of passive listening vulnerabilities can get watered down.

                                    0x00string@infosec.exchange0 1 Reply Last reply
                                    0
                                    • jpsays@mastodon.socialJ jpsays@mastodon.social

                                      @0x00string @tess I have had personal experience with msrc liberally applying rce as well.

                                      I get their argument. Because it can be triggered by a user clicking on a link to open remote content, they classify that as rce.

                                      Pretty much any pattern where a user can be coerced remotely will likely get an rce tag is my guess.

                                      But it does mean that other patterns of passive listening vulnerabilities can get watered down.

                                      0x00string@infosec.exchange0 This user is from outside of this forum
                                      0x00string@infosec.exchange0 This user is from outside of this forum
                                      0x00string@infosec.exchange
                                      wrote last edited by
                                      #21

                                      @jpsays @tess phone calls are rce

                                      0x00string@infosec.exchange0 1 Reply Last reply
                                      0
                                      • 0x00string@infosec.exchange0 0x00string@infosec.exchange

                                        @jpsays @tess phone calls are rce

                                        0x00string@infosec.exchange0 This user is from outside of this forum
                                        0x00string@infosec.exchange0 This user is from outside of this forum
                                        0x00string@infosec.exchange
                                        wrote last edited by
                                        #22

                                        @jpsays @tess sending a persuasive letter is rce

                                        0x00string@infosec.exchange0 1 Reply Last reply
                                        0
                                        • 0x00string@infosec.exchange0 0x00string@infosec.exchange

                                          @jpsays @tess sending a persuasive letter is rce

                                          0x00string@infosec.exchange0 This user is from outside of this forum
                                          0x00string@infosec.exchange0 This user is from outside of this forum
                                          0x00string@infosec.exchange
                                          wrote last edited by
                                          #23

                                          @tess @jpsays i dont get their argument, because its logically wrong

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups