마이크로 소프트 관리 콘솔 (MMC), 구성 및 시스템 성능을 추적하기 위해 시스템 관리자가 사용, 취약점의 수를 포함, 이는 공격자를 사용하면 공격을 컴퓨터에 악성 코드 또는 차단 제어를 구현할 수 있습니다.티he vulnerability group, which includes XSS 과 XXE bugs, received a common identifier CVE-2019-0948. 공격자는 MMC에 스냅인 메커니즘을 사용하여 문제를 이용할 수. Snap-ins are small programs that allow customizing different aspects of the system.
In order to exploit the vulnerability, an attacker will need to create a file with the .msc 신장, containing specially crafted XML content, and then convince an authorized user (예를 들면, using social engineering) to import this file.
As the researchers from Check Point, who discovered the bugs, explained, an attacker can create a file with the Link to Web Address snap-in (link to a web-resource) and include a link to its own server, thus redirecting to a page with malicious code.
“We have successfully managed to insert malicious URL link that contains malicious payloads such as redirection to SMB server that will capture the user NTLM hash”, - 보고서 연구원.
같은 방법으로, an attacker can create a file with the ActiveX Control snap-in and save it as an .msc file by changing the string value in the StringsTables section to a malicious URL controlled by it.
전문가에 따르면, MMC files are used by system administrators and are not considered antivirus software as malicious. Cybercriminals can take advantage of it to control of a PC with administrator status and further advance over the network.
The problems affect versions of 윈도우 7, 윈도우 8.1, 윈도우 10 과 윈도우 서버 2008 – 윈도우 서버 2019. Microsoft has already fixed vulnerabilities with the release of June service pack. 현재, there are no cases of bugs’ exploitation.
마이크로 소프트 관리 콘솔 (MMC) is a tool for opening, creating, and saving administration tools (called MMC consoles) that manage hardware, 소프트웨어, and network components of the MS Windows operating system.