New Details Emerge on Windows Zero Day

  /     /     /  
Publicated : 23/11/2024   Category : security


New Details Emerge on Windows Zero Day


The CVE-2019-0859 vulnerability, patched last week, is the latest in a string of Windows local privilege escalation bugs discovered at Kaspersky Lab.



Kaspersky Lab researchers today disclosed more details about CVE-2019-0859, one of two Windows zero-day vulnerabilities under active attack when Microsoft issued patches early last week.
CVE-2019-0859 and CVE-2019-0803 are elevation of privilege bugs. The former was discovered by Kaspersky Lab researchers Vasiliy Berdnikov and Boris Larin, the latter by Alibabas Cloud Intelligence Security Team. Berdnikov and Larin teamed up with malware analyst Anton Ivanov to publish more insight around the flaw, which has been reportedly exploited by an unknown criminal group trying to gain full control on a target device.
Kaspersky Lab found CVE-2019-0859 last month when their automatic exploit prevention systems detected an attempt to abuse a Windows vulnerability. Further analysis revealed a zero-day bug in win32k.sys – the fifth exploited local privilege escalation vulnerability in Windows they had discovered since October. They reported the bug to Microsoft on March 17; it was patched along with 73 other vulnerabilities on the most recent
Patch Tuesday
.
The exploit Berdnikov and Larin saw in the wild targeted 64-bit versions of Window, ranging from Windows 7 to 10. This particular attack was directed at the kernel of target systems via a backdoor constructed from a core component of the Windows operating system.
Following successful exploitation, it executed PowerShell with a Base64 encoded command. This command downloaded a second-stage script from PasteBin, and the second-stage PowerShell script executed the third stage – also a PowerShell script. This final script unpacks shellcode, allocates executable memory, copies shellcode to allocated memory, and calls CreateThread to execute shellcode, researchers explain in a
blog post
. Its primary goal was to create a backdoor, which provided the attacker with persistent access on the target system.
As Microsoft put in its advisory, CVE-2019-0859 would let a successful attacker run malicious code in kernel mode and install programs, view, change, or delete data, or create new accounts with full user rights. Theyd have to first log onto the system and run the crafted application.
This allows you to escalate privilege and get the same privileges the system has, Larin says. Its the highest level of privilege you can have.
What makes this incident particularly interesting is the attacker used the Metasploit framework, a publicly available tool, in conjunction with an exploit thats much harder for attackers to come by. Zero-day exploits [are] not available for the general public, Larin continues. Only advanced actors use them. The use of Metasploit also complicates attribution in this scenario, Larin explains, because its freely available for everyone.
Taking a look back, this string of privilege escalation bug discoveries
started
with CVE-2018-8453, which was found by the Kaspersky Lab team in August and fixed in October. The exploit was seen being used in targeted attacks, during which it was executed by the first stage of a malware installer to achieve privileges needed to persist on victim systems. In November, Microsoft patched CVE-2018-8589,
another
Windows zero-day found by the KL researchers.
The trend continued: December brought a patch for CVE-2018-8611, a Win32k elevation of privilege
flaw
inside the Kernel Transaction Manager that could be used to escape the sandbox in modern browsers. In March, Microsoft
patched
CVE-2019-0797, a Windows zero-day believed to be in use among several attack groups, including FruityArmor and SandCat.
Cybercriminals are quickly ramping up their use of PowerShell malware,
which grew
432% in 2017. This type of malware abuses the legitimate functionality of the scripting tool to launch malicious activity; its a popular target because it simplifies the concealment of illicit activity.
Related Content:
The Single Cybersecurity Question Every CISO Should Ask
8 SOC-as-a-Service Offerings
Tax Hacks: How Seasonal Scams Cause Yearlong Problems
Senate Report on Equifax Raises Questions Ahead of FICO Product Announcement
 
 
 
Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industrys most knowledgeable IT security experts. Check out the
Interop agenda
here.

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
New Details Emerge on Windows Zero Day