Google reveals a wrongly patched Windows vulnerability

Google reveals a wrongly patched Windows vulnerability

Released Project Zero Affiliate Team For a company Google General details of the vulnerability patched a bug in the API feature Print spooler In Windows OS, Which attackers can take advantage of to execute random code.

Details of the erroneously corrected flaw were publicly revealed after Microsoft failed to correct it within 90 days of the responsible disclosure on September 24.

The error was originally traced back to the name CVE-2020-0986The flaw is related to raising the level of exploiting privileges in the API for the print spooler feature in the Windows operating system Which was reported to Microsoft in late December 2019 through Anonymous user working with Trend Micro’s Zero Day Initiative.

In the absence of a patch for about six months, it released Trend Micro’s Zero Day Initiative earlier this year Advice General advice about error.

It was then Exploit The error is in campaign named Operation PowerFall Against an unnamed South Korean company.

Successful exploitation of this vulnerability allows the attacker to tamper with the memory of the splwow64.exe process in order to execute random code in kernel mode, install malware, view, change or delete data, or create new accounts with full user rights.

And theCorrected Microsoft reported this error through an update released in June, but new findings by Google’s security team reveal that the flaw has not been fully fixed.

“Maddie Stone, a researcher on the Project Zero team, said:” report: The security vulnerability still exists, but the method of exploitation has changed.

Microsoft is expected to solve the new issue, dubbed CVE-2020-17008, on January 12, 2021.

And theShe said Stone: There have been far too many incidents this year due to the known security vulnerabilities Actively exploited after being wrongly or incompletely fixed.

She added: When such vulnerabilities are not completely fixed, attackers can easily reuse their knowledge of the vulnerabilities and methods of exploiting them to develop new vulnerabilities.

Leave a Reply