New zero-day vulnerability in Windows Installer affects all versions of Microsoft's OS
In brief: Calculator security group Cisco Talos has found a new vulnerability that affects every Windows version to date, including Windows 11 and Server 2022. The vulnerability exists in the Windows Installer and allows hackers to elevate their privileges to go an ambassador.
The discovery of this vulnerability led the Cisco Talos group to update its Snort rules, which consists of rules to detect attacks targeting a list of vulnerabilities. The updated listing of rules includes the zero-day elevation of privilege vulnerability, equally well as new and modified rules for emerging threats from browsers, operating systems and network protocols, amid others.
Exploiting this vulnerability allows hackers with limited user access to elevate their privileges, acting every bit an administrator of the system. The security firm has already establish malware samples out on the Internet, and then there's a good hazard someone already fell victim to information technology.
The vulnerability had been previously reported to Microsoft by Abdelhamid Naceri, a security researcher at Microsoft, and was supposedly patched with the set up CVE-2021-41379 on November nine. However, the patch didn't seem to be plenty to fix the issue, as the problem persists, leading Naceri to publish the proof-of-concept on GitHub.
In unproblematic terms, the proof-of-concept shows how a hacker can replace any executable file on the system with an MSI file using the discretionary access command list (DACL) for Microsoft Edge Tiptop Service.
Microsoft rated the vulnerability as "medium severity," with a base of operations CVSS (Common Vulnerability scoring system) score of 5.5 and a temporal score of 4.eight. Now that a functional proof-of-concept exploit code is available, others could effort to further abuse it, possibly increasing these scores. At the moment, Microsoft has yet to issue a new update to mitigate the vulnerability.
Naceri seems to have tried to patch the binary himself, but with no success. Until Microsoft patches the vulnerability, the Cisco Talos group recommends those using a Cisco secure firewall to update their rules set with Snort rules 58635 and 58636 to keep users protected from the exploit.
Source: https://www.techspot.com/news/92368-new-zero-day-vulnerability-windows-installer-affects-all.html
Posted by: lukasikracrought.blogspot.com
0 Response to "New zero-day vulnerability in Windows Installer affects all versions of Microsoft's OS"
Post a Comment