NewsSecurity Vulnerabilities

Internet Explorer Zero-day Vulnerability

Zero-day exploits get their name because they show up in the hands of attackers before an official patch is available, giving defenders zero days of advance warning to fix affected systems.

A vulnerability in Internet Explorer (IE) and any applications that use the IE kernel are being exploited through malicious Microsoft Office documents which are distributed through spam email campaigns.

When a user opens the document, a malicious webpage is opened in the background which delivers the malware from a Command and Control (C2) server.

When successfully exploited, the attack uses a publicly known User Account Control (UAC) bypass. The attack then escalates privileges on the user’s device.

The Qihoo 360 Core team said the zero-day uses a so-called “double kill” vulnerability that affects the latest versions of Internet Explorer and any other applications that use the IE kernel.

Affected Platforms

  • Internet Explorer – All Versions
  • Applications that use the IE kernel





Duncan

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.