• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Security Experts Highlight Exploit for Patched Windows Flaw

You are here: Home / General Cyber Security News / Security Experts Highlight Exploit for Patched Windows Flaw
June 9, 2023

Security scientists have learned and unveiled specifics about an actively exploited Microsoft Windows security flaw that could let risk actors to obtain elevated privileges on impacted devices. 

Tracked as CVE-2023-29336 and rated 7.8 in CVSS severity, the vulnerability is relevant to an elevation of privilege bug in the Get32k ingredient of Windows. A patch for the flaw was produced by Microsoft as element of the May 2023 Patch Tuesday update.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Go through a lot more on the newest Patch Tuesday: Microsoft Patches 3 Zero-Day Bugs This Thirty day period

While the exact aspects of the in-the-wild exploitation remain mysterious, cybersecurity agency Numen Cyber has deconstructed the patch launched by Microsoft and created a proof-of-thought (PoC) exploit for Windows Server 2016.

In its advisory, Numen Cyber highlighted that Win32k vulnerabilities have a record. Microsoft has attempted to refactor this component of the kernel code applying Rust in the most up-to-date Windows 11 preview model, which might do away with this kind of vulnerabilities in the long term.

The vulnerability will allow lower-privileged consumers to receive Program privileges, the maximum consumer mode privileges in Windows. Cybersecurity firm Avast was initial credited with discovering the flaw, revealing that it was actively exploited as a zero-day in attacks.

Quickly ahead to this 7 days, Numen Cyber warned that exploiting this vulnerability does not demand novel procedures and intensely depends on leaked desktop heap handle addresses. Thus, more mature techniques remain at risk if this issue is not tackled completely.

“While this vulnerability looks to be non-exploitable on the Earn11 program variation, it poses a substantial risk to previously techniques,” reads the complex publish-up.

Process administrators are suggested to be vigilant for abnormal offset reads and writes in memory or linked to window objects, as they may show energetic exploitation of CVE-2023-29336 for regional privilege escalation.

Additional vulnerabilities possibly letting attackers to achieve elevated privileges were being recently uncovered in the preferred graphics debugger RenderDoc.

Image credit: diy13 / Shutterstock.com


Some elements of this short article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Minecraft Users Warned of Malware Targeting Modpacks
Next Post: 5 Reasons Why Access Management is the Key to Securing the Modern Workplace 5 reasons why access management is the key to securing»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks
  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies

Copyright © TheCyberSecurity.News, All Rights Reserved.