• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Remote Code Execution Vulnerability Found in Windows Internet Key Exchange

You are here: Home / General Cyber Security News / Remote Code Execution Vulnerability Found in Windows Internet Key Exchange
November 25, 2022

A series of exploits have been observed in the wild focusing on Windows Internet Critical Exchange (IKE) Protocol Extensions.

In accordance to a new advisory a short while ago shared by security firm Cyfirma with Infosecurity, the identified vulnerabilities could have been exploited to target nearly 1000 units.

The attacks noticed by the enterprise would be component of a campaign that roughly translates to “bleed you” by a Mandarin-speaking danger actor. 

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The Cyfirma Research team has also noticed not known hackers sharing an exploit hyperlink on underground community forums, which could be employed to goal vulnerable programs.

“A critical vulnerability has been determined in Microsoft Windows IKE Protocol Extensions,” reads the advisory.

“This vulnerability […] impacts unfamiliar code of the IKE Protocol Extensions part, manipulation of which prospects to remote code execution (RCE).”

In particular, Cyfirma wrote that the vulnerability lies in the code utilised to deal with the IKEv1 […] protocol, which is deprecated but compatible with legacy methods.

The corporation has also clarified that although IKEv2 is not impacted, the vulnerability influences all Windows Servers since they acknowledge both V1 and V2 packets, producing the flaw critical.

“The [proof of concept] exploits a memory corruption issue with the svchost of the susceptible method,” reads the complex create-up.

“Memory corruption takes place when Webpage Heap (a debugging plug-in) in the procedure is enabled for the Internet Key Exchange procedure. The exe procedure hosting the Internet Crucial Exchange protocol provider crashes when trying to study data further than an allotted buffer.”

In conditions of attribution, Cyfirma explained the risk actor is currently unidentified but also that the workforce observed connections concerning the “bleed you” marketing campaign and Russian cyber-criminals.

“From a strategic viewpoint on shifting geopolitical situations from external menace landscape administration, Russia and China are observed to form a strategic connection,” wrote the company.

Cyfirma included that Microsoft has allocated CVE-2022-34721 to the issue and set it by including a look at on incoming knowledge length and skipping processing of that information if the duration is also small.


Some areas of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «update chrome browser now to patch new actively exploited zero day Update Chrome Browser Now to Patch New Actively Exploited Zero-Day Flaw
Next Post: Google Releases Chrome Patch to Fix New Zero-Day Vulnerability Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.