Microsoft has patched an elevation-of-privilege vulnerability it said is actively being exploited by hackers. The fix was part of Microsoft’s scheduled September Patch Tuesday release, which also included fixes for two other bugs found being used in the wild, including the zero-day found in the Windows Task Scheduler last week.
Most notable out of the flaws revealed Tuesday is Windows elevation-of-privilege vulnerability (rated important). The bug was reported Aug. 27 via Twitter by researcher @SandboxEscaper. The bug (CVE-2018-8440) could allow a local adversary to leverage a Windows task scheduler API weakness and run arbitrary code on a targeted system.
Microsoft did indicate that the bug (CVE-2018-8440) was being actively exploited. Researchers at Recorded Future and elsewhere also said the bug was being used in active campaigns and urged system admins to update systems as soon as possible.
“[We are] seeing these vulnerabilities being exploited in the wild… so these should be the first priority when it comes to patching,” wrote Allan Liska, threat intelligence analyst at Recorded Future, in breakdown of Microsoft’s release of patches. The vulnerability impacts Windows 7 through Windows 10 and including Windows Server 2008 through Windows Server 2016.
In addition to these, Microsoft patched two critical vulnerabilities (CVE-2018-8475 and CVE-2018-8457) that it said were publicly known, but not exploited. A fourth important denial-of-service bug (CVE-2018-8409) was also publicly known previous to being patched, but not exploited.
In addition to these flaws, Microsoft also tackled a pair of critical Windows Hyper-V RCE vulnerabilities.
“These are two different CVEs, but I grouped them together as they have the same exploit scenario and impact,” wrote Zero Day Initiative’s Dustin Childs in his Patch Tuesday analysis. “For both cases, a user on a guest virtual machine could execute code on the underlying hypervisor OS. The root cause for both of these bugs goes back to the failure to properly validate user input.”
Two other serious RCE vulnerabilities being addressed this month are a Win32k graphics vulnerability (CVE-2018-8332), which could be exploited by convincing a user to browse to a website or open a document containing a malicious embedded font, said Greg Wiseman, senior security researcher, at Rapid7 in his analysis of Microsoft’s Patch Tuesday release.
He also warned of the vulnerability (CVE-2018-8430), a Word PDF RCE vulnerability.
“A remote code-execution vulnerability exists in Microsoft Word if a user opens a specially crafted PDF file,” Microsoft noted regarding the bug. “An attacker who successfully exploited the vulnerability could cause arbitrary code to execute in the context of the current user. To exploit the vulnerability, an attacker must entice the user to open a specially crafted PDF file.”
(This story was updated 9/13/2018 to correct assertions by a vendor that two CVEs, in addition to CVE-2018-8440, were actively being exploited at the time Microsoft released its September Patch Tuesday bulletin.)