Casa » Notícia » Vulnerabilidades no MMC permitem tomar o controle sobre o sistema

Vulnerabilidades no MMC permitem tomar o controle sobre o sistema

O Console de Gerenciamento Microsoft (MMC), usada por administradores de sistema para configurar e monitorar o desempenho do sistema, contém um número de vulnerabilidades, usando quais os atacantes podem implementar malware ou controle de interceptação na máquina atacada.

The vulnerability group, which includes XSS e XXE insetos, received a common identifier CVE-2019-0948. Atacantes podem explorar problemas usando o mecanismo de snap-in no MMC. Snap-ins are small programs that allow customizing different aspects of the system.

In order to exploit the vulnerability, an attacker will need to create a file with the .msc extensão, containing specially crafted XML content, and then convince an authorized user (por exemplo, using social engineering) to import this file.

As the researchers from Check Point, who discovered the bugs, explained, an attacker can create a file with the Link to Web Address snap-in (link to a web-resource) and include a link to its own server, thus redirecting to a page with malicious code.

“We have successfully managed to insert malicious URL link that contains malicious payloads such as redirection to SMB server that will capture the user NTLM hash”, - relatório pesquisadores.

Do mesmo jeito, an attacker can create a file with the ActiveX Control snap-in and save it as an .msc file by changing the string value in the StringsTables section to a malicious URL controlled by it.

The attacker chooses an ActiveX Control snap-in
The attacker chooses an ActiveX Control snap-in

De acordo com os especialistas, MMC files are used by system administrators and are not considered antivirus software as malicious. Cybercriminals can take advantage of it to control of a PC with administrator status and further advance over the network.

The problems affect versions of janelas 7, janelas 8.1, janelas 10 e Windows Server 2008Windows Server 2019. Microsoft has already fixed vulnerabilities with the release of June service pack. atualmente, there are no cases of bugs’ exploitation.

Fonte: https://research.checkpoint.com

[Total: 0    Média: 0/5]

Sobre Trojan Killer

Carry Trojan Killer portátil em seu memory stick. Certifique-se que você é capaz de ajudar o seu PC resistir a quaisquer ameaças cibernéticas onde quer que vá.

Além disso, verifique

chaves mestras GandCrab

FBI lançado chaves mestras para descriptografar todas as versões Gandcrab

O FBI lançou chaves mestras para descriptografar arquivos afetados por versões ransomware Gandcrab 4, …

Emotet trojan

Índice Global Threat: Emotet rede de bots suspendeu as suas actividades

Verifique equipa Ponto Research (uma divisão da Check Point Software Technologies) publicou uma ameaça mundial …

Deixar uma resposta