ARMORYZE
  • Home
  • Solutions
    • Zero Trust Security
    • Cloud Security
    • Web Application & API Protection
    • SIEM Logging & Monitoring
    • Risk Based Vulnerability Management
  • Services
    • Cyber Essentials & Cyber Essentials Plus Certification
    • IASME Cyber Assurance Certification
    • ISO27001 Certification
    • Penetration Testing
    • Cloud Security Assessment
    • Managed Detection & Response
    • Managed Security Services
    • Managed Compliance Services
  • Company
    • About Us
    • Customer Success Story
    • Free Resources >
      • Whitepaper - How To Prioritize Risk Across the Attack Surface
      • The Ultimate Guide to Achieving Cyber Essentials Plus Certification
      • ISO 27001 Implementation Checklist
      • Whitepaper - What is Credential Stuffing? How To Prevent Credential Stuffing Attacks.
      • eBook: Effective Security Strategies for Devops & Application Services
      • eBook - How To Build A Next Generation SOC
      • Free Cyber Security Assessment & Consultation
    • Free Trial >
      • Armoryze USM Anywhere - Free Trial
    • Careers >
      • Account Manager
      • Business Development Manager
      • Cyber Security Engineer
    • Contact Us
    • Blog
    • Privacy-Policy
  • SHOP
    • Cyber Essentials Certification
    • Cyber Essentials Certification with Expert Assistance
    • Cyber Essentials Plus Certification

Windows Zero Day Vulnerability Exploited In The Wild

25/3/2020

0 Comments

 
Picture
According to Microsoft security alert, cyber criminals and hackers are exploiting a zero-day vulnerability in the Windows 7 OS to take over systems.
 
Zero Day Vulnerability (ADV200006):
Microsoft Windows Adobe Type Manager Library is affected by two remote code execution vulnerabilities as it improperly handles a specially-crafted multi-master font (Adobe Type 1 PostScript format). Successful exploitation would require a remote attacker to convince a user to open a specially crafted document leading to memory corruption and executing arbitrary code on the system. This may result in complete compromise of vulnerable system.
 
Windows Impacted Systems:
All supported Windows and Windows Server operating systems are affected.
Windows 7, 8.1, RT 8.1, 10, Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019
 
Microsoft says there are two remote code execution (RCE) vulnerabilities in this built-in library that allow attackers to run code on a user's system and take actions on their behalf.
 
"There are multiple ways an attacker could exploit the vulnerability, such as convincing a user to open a specially crafted document or viewing it in the Windows Preview pane," the company said.
 
The company described the current attacks exploiting the zero-day as "limited" and "targeted." The attacks were primarily aimed at Windows 7 systems; however, other Windows versions are also impacted.
 
According to Microsoft, all currently supported versions of the Windows and Windows Server operating systems are vulnerable. However, the zero-day vulnerability is less effective in Windows 10 machines, where the atmfd.dll file is either not present, or runs inside an AppContainer sandbox with limited permissions and capabilities.
 
Microsoft security updates are currently not available for this defect. Microsoft intimated that they might arrive during next month's Patch Tuesday, most likely scheduled for April 14.
 
In the meantime, Microsoft has published a series of mitigations that companies and home users can take if they believe they might be targeted with a Windows zero-day attack. Microsoft said the mitigations are not needed for Windows 10 systems, where the zero-day has a reduced impact.
 
Zero Day vulnerability mitigations steps include taking actions like:
  • Disabling the Preview Pane and Details Pane in Windows Explorer
  • Disabling the WebClient service
  • Renaming ATMFD.DLL

0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Book Free - Cyber Security Assessment & Consultation!
    BOOK NOW

      Free - Sign up for email cyber security news & updates!​
    REGISTER ME NOW

    Follow Us and Share on Social Media. Join the Community to fight cyber crime.
    Picture
    Picture
© 2023 Armoryze Consultancy Services, All Rights Reserved
Picture
  • Home
  • Solutions
    • Zero Trust Security
    • Cloud Security
    • Web Application & API Protection
    • SIEM Logging & Monitoring
    • Risk Based Vulnerability Management
  • Services
    • Cyber Essentials & Cyber Essentials Plus Certification
    • IASME Cyber Assurance Certification
    • ISO27001 Certification
    • Penetration Testing
    • Cloud Security Assessment
    • Managed Detection & Response
    • Managed Security Services
    • Managed Compliance Services
  • Company
    • About Us
    • Customer Success Story
    • Free Resources >
      • Whitepaper - How To Prioritize Risk Across the Attack Surface
      • The Ultimate Guide to Achieving Cyber Essentials Plus Certification
      • ISO 27001 Implementation Checklist
      • Whitepaper - What is Credential Stuffing? How To Prevent Credential Stuffing Attacks.
      • eBook: Effective Security Strategies for Devops & Application Services
      • eBook - How To Build A Next Generation SOC
      • Free Cyber Security Assessment & Consultation
    • Free Trial >
      • Armoryze USM Anywhere - Free Trial
    • Careers >
      • Account Manager
      • Business Development Manager
      • Cyber Security Engineer
    • Contact Us
    • Blog
    • Privacy-Policy
  • SHOP
    • Cyber Essentials Certification
    • Cyber Essentials Certification with Expert Assistance
    • Cyber Essentials Plus Certification