Microsoft, DHS Warn of Zero-Day Attack Targeting IE Users

  /     /     /  
Publicated : 23/11/2024   Category : security


Microsoft, DHS Warn of Zero-Day Attack Targeting IE Users


Software firm is aware of limited targeted attacks exploiting a scripting issue vulnerability in Internet Explorer 9, 10, and 11 that previously has not been disclosed.



A targeted attack is targeting a previously unknown vulnerability in Internet Explorer to corrupt memory and exploit victims Windows systems, Microsoft warned in an advisory published on January 17.
The flaw, described as a scripting engine memory corruption vulnerability and designated CVE-2020-0674, allows an attacker to take control of a Windows system by forcing it to use an older version of Microsofts JavaScript that is only present for backward compatibility. By default, Internet Explorer does not use the vulnerable dynamic library, Microsoft stated.
The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, Microsoft stated in Advisory 200001. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system.
While the attack is serious, its impact is limited because Internet Explorer is only used by a limited number of users who want backward compatibility with older Microsoft technologies. Currently, only 2.3% of visitors use Internet Explorer 11, one of the vulnerable versions,
according to W3counter
.
The vulnerable library, jscript.dll is typically not used, so an attacker needs to control the website or have created a web page that is opened in a vulnerable browser.
By convincing a user to view a specially crafted HTML document — [that is,] a web page [or] an email attachment — PDF file, Microsoft Office document, or any other document that supports embedded Internet Explorer scripting engine content, an attacker may be able to execute arbitrary code, Carnegie Mellon Universitys CERT Coordination Center
stated in an advisory
.
Companies that rely on Internet Explorer — a much smaller portion than a decade ago — should apply Microsofts recommended workaround as soon as possible, says Casey Ellis, founder and chief technology officer of Bugcrowd.
In the absence of a patch, having a workaround is crucial, and its great that Microsoft provided alternatives to mitigate the risk to users, he says. Since Googles Threat Analysis Group reported the vulnerability, its unlikely that Chrome is affected by a similar bug and is safe to use.
The advice to use another browser is a more viable protection, mostly since other browsers are now much more popular than Microsoft Edge. Currently, only about 8% of web visitors use either Internet Explorer or, more likely, Microsoft Edge,
according to W3Counter
.
This is not the first time that Microsoft has had to scramble to contain attacks targeted its older scripting engines. If it seems like deja vu, its because Microsoft patched a similar flaw in November. The issue,
CVE-2019-1429
, allowed attackers to corrupt the scripting engines memory using a specially crafted website or an ActiveX control.
A year before that, another vulnerability, CVE-2018-8653,
affected the scripting engine of Internet Explorer
, allowing attackers to execute Visual Basic scripts or Microsofts version of JavaScript.
Although Microsoft adopted a bug bounty to head off flaws, nation-state and criminal hackers continue to find ways to compromise systems, raising the question: If Microsofts bug bounty did not convince the attacker to sell the vulnerability information to the software maker, are bug bounties effective?
Bugcrowds Ellis defends the bounties because they raise the price of exploits and give ethical researchers another reason to disclose issues.
This does not undermine bug bounties or crowdsourced security, he says. The reality is that since the exploit has been used in limited targeted attacks, it is likely an offensive buyer paid more for it than Microsoft was offering or it was developed in-house for offensive use.
Ellis notes that Microsoft credited two organizations for finding the latest issue.
Related Content
Microsoft Patches IE Zero-Day Among 74 Vulnerabilities
Microsoft Issues Out-of-Band Patch for Internet Explorer
Researchers Disclose New Vulnerabilities in Windows Drivers
Attackers Use Scripting Flaw in Internet Explorer, Forcing Microsoft Patch
Check out The Edge, Dark Readings new section for features, threat data, and in-depth perspectives. Todays top story:
With International Tensions Flaring, Cyber-Risk Is Heating Up for All Businesses
.

Last News

▸ Security pros top concern: Rogue employees, study finds. ◂
Discovered: 26/12/2024
Category: security

▸ Obama supports NSA Prism program, Google denies access point ◂
Discovered: 26/12/2024
Category: security

▸ Glasgow Council fined for weak security. ◂
Discovered: 26/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Microsoft, DHS Warn of Zero-Day Attack Targeting IE Users