However, Microsoft has offered a temporary solution that will protect Office 365 and Office 2019 users.
First, the attack can be averted if Microsoft Office executes the standard configuration and opens documents from the web in Protected View or Application Guard.
The former is a read-only mode in which most editing functions are disabled, while the latter isolates untrusted documents.
Another workaround that Microsoft listed online is to disable the installation of all ActiveX controls.
Microsoft said, “Disabling the installation of all ActiveX controls in Internet Explorer will make this attack less severe. This can be achieved for all sites by updating the registry. Previously installed ActiveX controls will continue to run, but will not expose this vulnerability.