{"id":22282,"date":"2021-11-25T10:53:31","date_gmt":"2021-11-25T09:53:31","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=22282"},"modified":"2021-11-25T10:53:31","modified_gmt":"2021-11-25T09:53:31","slug":"windows-0-day-im-installer-und-schwachstelle-in-mshtml-werden-ausgenutzt","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/11\/25\/windows-0-day-im-installer-und-schwachstelle-in-mshtml-werden-ausgenutzt\/","title":{"rendered":"Windows attacks via 0-day in installer and vulnerability in MSHTML"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Windows\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/11\/25\/windows-0-day-im-installer-und-schwachstelle-in-mshtml-werden-ausgenutzt\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Attackers are exploiting a now-patched CVE-2021-40444 vulnerability in Microsoft's MSHTML routines to attack Windows systems. And the 0-day vulnerability in Windows Installer that I addressed here on the blog the other days is being exploited by malware for privilege escalation. Here's an overview of the threats to Windows users via these two rails.<\/p>\n<p><!--more--><\/p>\n<h2>0-day exploited in Windows Installer<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg08.met.vgwort.de\/na\/e49fa2c786b74885a66cd3f303acfade\" width=\"1\" height=\"1\">I had pointed out in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/11\/23\/0-day-lpe-schwachstelle-im-windows-installer-nov-2021\/\">0-Day LPE Vulnerability in Windows Installer (Nov. 2021)<\/a> that a security researcher had found a 0-day vulnerability in Windows Installer. Using this vulnerability, a local attacker could gain administrative privileges. This would not normally be a problem, as the 'Windows Installer Elevation of Privilege' vulnerability <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-41379\" target=\"_blank\" rel=\"noopener\">CVE-2021-41379<\/a> was patched in November 2021 by the regular security updates for Windows.&nbsp; <\/p>\n<p>Microsoft also assessed the vulnerability as low in its threat level (base CVSS score 5.5, temporary score 4.8) because the attacker must already be running an application locally on the system. However, the whole thing becomes a problem because the security researcher has found a workaround, the patch is ineffective. All Windows versions are affected, including Windows 10, the brand new Windows 11 and all Windows Server versions.<\/p>\n<p>Security researchers from Cisco Talos already pointed out that the vulnerability is being exploited on November 23, 2021 in the article <a href=\"https:\/\/blog.talosintelligence.com\/2021\/11\/attackers-exploiting-zero-day.html\" target=\"_blank\" rel=\"noopener\">Attackers exploiting zero-day vulnerability in Windows Installer \u2014 Here's what you need to know and Talos' coverage<\/a>. Specifically, it says that Talos has already discovered malware samples in the wild that attempt to exploit this vulnerability. Cisco Talos has therefore published new SNORT\u24c7 rules to protect against exploitation of this 0-day vulnerability in Microsoft Windows Installer. Hopefully, Microsoft will patch this vulnerability soon. <\/p>\n<h2>PowerShortShell grabs credentials via MSHTML bug<\/h2>\n<p>Recently, a new Iranian threat actor that steals Google and Instagram credentials from Farsi-speaking targets around the world was discovered by security researchers at SafeBreach Lab (see <a href=\"https:\/\/twitter.com\/ShadowChasing1\/status\/1438126675565244417\" target=\"_blank\" rel=\"noopener\">tweet<\/a>). The attacker uses a new PowerShell-based stealer dubbed PowerShortShell by security researchers. <\/p>\n<p>This info stealer is also used to monitor the Telegram platform and collect system information from compromised devices. The information, along with stolen credentials, is sent to servers controlled by the attackers, as Bleeping Computer colleagues <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-exploit-microsoft-mshtml-bug-to-steal-google-instagram-creds\/\" target=\"_blank\" rel=\"noopener\">write here<\/a>. <\/p>\n<p>This has been spread since July 2021 via spear phishing emails targeting Windows users with the RCE vulnerability CVE-2021-40444 in Microsoft MSHTML unpatched via compromised Word documents. <\/p>\n<blockquote>\n<p>MSHTML (<a href=\"https:\/\/de.wikipedia.org\/wiki\/Trident_(Software)\" target=\"_blank\" rel=\"noopener\">Trident<\/a>) is the HTML rendering engine of Internet Explorer included in all previous versions of Windows. It is known that attackers have used manipulated Office documents to attack the vulnerability in the HTML rendering engine via ActiveX components downloaded from attacker websites and reinstalled. I have published a couple of posts on this vulnerability here on the blog (see the list of links at the end of the article).<\/p>\n<\/blockquote>\n<p>As of September 14, 2021, Microsoft then released a patch for the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\" target=\"_blank\" rel=\"noopener\">CVE-2021-40444<\/a> vulnerability and shipped it with the Windows cumulative updates that include Internet Explorer and the Internet Explorer 11 cumulative update <a href=\"https:\/\/support.microsoft.com\/help\/5005563\" target=\"_blank\" rel=\"noopener\">KB5005563<\/a>, dated 9\/14\/2021. The problem is that Microsoft's security updates do not apply to older Windows 10 versions. ACROS Security therefore provides 0patch solutions to secure Windows against the MSHTML vulnerability (CVE-2021-40444). I had addressed this in the blog post<a href=\"https:\/\/borncity.com\/win\/2021\/09\/27\/windows-10-0patch-fix-fr-mshtml-schwachstelle-cve-2021-40444\/\">Windows 10: 0patch fix for MSHTML vulnerability (CVE-2021-40444)<\/a>.<\/p>\n<p><img decoding=\"async\" title=\"PowerShortShell-Victims\" alt=\"PowerShortShell-Victims\" src=\"https:\/\/i.imgur.com\/qd8eYXh.png\"><\/p>\n<p>Now most of my blog readership will not be part of the Farsi-speaking population with Iranian roots. But the colleagues at Bleeping Computer have published the above graph, based on the very detailed SafeBreach report <a href=\"https:\/\/www.safebreach.com\/blog\/2021\/new-powershortshell-stealer-exploits-recent-microsoft-mshtml-vulnerability-to-spy-on-farsi-speakers\/\" target=\"_blank\" rel=\"noopener\">New PowerShortShell Stealer Exploits Recent Microsoft MSHTML Vulnerability to Spy on Farsi Speakers<\/a>. The majority of victims are found in the US &#8211; but still 8.3% were detected in Germany. And the Netherlands is also doing well with 12.5%.&nbsp; <\/p>\n<h2>CVE-2021-40444 targeted by more attackers<\/h2>\n<p>There is another aspect to the story: the RCE vulnerability CVE-2021-40444 in IE's MSTHML rendering engine has been exploited in the wild as a zero-day since August 18, 2021. Attackers thus exploited the vulnerability more than two weeks before Microsoft issued a security advisory with a partial workaround and three weeks before a patch was released.<\/p>\n<p>Microsoft states that multiple threat actors (including ransomware offshoots) targeted this vulnerability using specially crafted Office documents distributed via phishing attacks. It involved a campaign that exploited the vulnerability by distributing custom Cobalt Strike beacon loaders. Bleeping Computer colleagues state that the vulnerability was most recently exploited by the Magniber ransomware group. Thus, the risk of an unpatched MSHTML library mutating into a gateway for malware is real.<\/p>\n<p><strong>Similar articles<\/strong><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/09\/08\/angriff-ber-office-dokumente-auf-microsoft-mshtml-activex-rce-schwachstelle-cve-2021-40444\/\">Attack via Office Documents on Microsoft MSHTML (ActiveX) RCE Vulnerability (CVE-2021-40444)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/09\/10\/mshtml-schwachstelle-cve-2021-40444-kritischer-als-bekannt\/\">MSHTML vulnerability CVE-2021-40444 more critical than known<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/09\/14\/desaster-windows-mshtml-schwachstelle-cve-2021-40444-hoffentlich-kommt-heute-ein-patch\/\">Disaster Windows MSHTML vulnerability CVE-2021-40444, hopefully a patch will come today<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/09\/17\/patchday-nachlese-sept-2021-patch-der-mshtml-schwachstelle-cve-2021-40444\/\">Patch day recap Sept. 2021: Update on MSHTML vulnerability CVE-2021-40444<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/09\/27\/windows-10-0patch-fix-fr-mshtml-schwachstelle-cve-2021-40444\/\">Windows 10: 0patch fix for MSHTML vulnerability (CVE-2021-40444)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/11\/23\/0-day-lpe-schwachstelle-im-windows-installer-nov-2021\/\">0-Day LPE Vulnerability in Windows Installer (Nov. 2021)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Attackers are exploiting a now-patched CVE-2021-40444 vulnerability in Microsoft's MSHTML routines to attack Windows systems. And the 0-day vulnerability in Windows Installer that I addressed here on the blog the other days is being exploited by malware for privilege escalation. &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/11\/25\/windows-0-day-im-installer-und-schwachstelle-in-mshtml-werden-ausgenutzt\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[69,194],"class_list":["post-22282","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=22282"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22282\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=22282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=22282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=22282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}