Page 2 of 16 results (0.011 seconds)

CVSS: 7.1EPSS: 13%CPEs: 13EXPL: 1

We have investigated reports of a spoofing vulnerability in AppX installer that affects Microsoft Windows. Microsoft is aware of attacks that attempt to exploit this vulnerability by using specially crafted packages that include the malware family known as Emotet/Trickbot/Bazaloader. An attacker could craft a malicious attachment to be used in phishing campaigns. The attacker would then have to convince the user to open the specially crafted attachment. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Please see the Security Updates table for the link to the updated app. Alternatively you can download and install the Installer using the links provided in the FAQ section. Please see the Mitigations and Workaround sections for important information about steps you can take to protect your system from this vulnerability. December 27 2023 Update: In recent months, Microsoft Threat Intelligence has seen an increase in activity from threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the ms-appinstaller URI scheme. To address this increase in activity, we have updated the App Installer to disable the ms-appinstaller protocol by default and recommend other potential mitigations. • https://github.com/ChrisTitusTech/winutil/pull/26 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-43890 https://thehackernews.com/2023/12/microsoft-disables-msix-app-installer.html https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-msix-protocol-handler-abused-in-malware-attacks https://www.microsoft.com/en-us/security/blog/2023/12/28/financially-motivated-threat-actors-misusing-app-installer •

CVSS: 7.8EPSS: 91%CPEs: 19EXPL: 3

An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'. Existe una vulnerabilidad de elevación de privilegios cuando el Windows Background Intelligent Transfer Service (BITS) maneja inapropiadamente los enlaces simbólicos, también se conoce como "Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability". Microsoft Windows BITS is vulnerable to to a privilege elevation vulnerability if it improperly handles symbolic links. An actor can exploit this vulnerability to execute arbitrary code with system-level privileges. • https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION https://github.com/yanghaoi/CVE-2020-0787 http://packetstormsecurity.com/files/158056/Background-Intelligent-Transfer-Service-Privilege-Escalation.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0787 https://itm4n.github.io/cve-2020-0787-windows-bits-eop https://github.com/itm4n/BitsArbitraryFileMove https://attackerkb.com/assessments/e61cfec0-d766-4e7e-89f7-5aad2460afb8 https://googleprojectzero.blogspot.com/2018&# • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.8EPSS: 86%CPEs: 6EXPL: 9

An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836. Existe una elevación de la vulnerabilidad de privilegios cuando el Servicio de implementación de Windows AppX (AppXSVC) maneja incorrectamente los enlaces físicos, también conocida como "Vulnerabilidad de Elevación Privilegios de Windows". El ID de este CVE es diferente de CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805 y CVE-2019-0836. This vulnerability allows local attackers to escalate privileges on vulnerable installations of Microsoft Windows. • https://www.exploit-db.com/exploits/46976 https://www.exploit-db.com/exploits/46938 https://www.exploit-db.com/exploits/46683 https://www.exploit-db.com/exploits/47128 https://github.com/rogue-kdc/CVE-2019-0841 https://github.com/0x00-0x00/CVE-2019-0841-BYPASS https://github.com/likescam/CVE-2019-0841 https://github.com/mappl3/CVE-2019-0841 http://packetstormsecurity.com/files/152463/Microsoft-Windows-AppX-Deployment-Service-Privilege-Escalation.html http://packetstormsecurity.com • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 8.8EPSS: 5%CPEs: 10EXPL: 0

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0806, CVE-2019-0812, CVE-2019-0829, CVE-2019-0860, CVE-2019-0861. Existe una vulnerabilidad de ejecución remota de código en la forma en que el motor de scripting Chakra maneja los objetos en memoria en Microsoft Edge, también conocido como 'Vulnerabilidad de Corrupción de Memoria en el Motor de Scripting Chakra'. El ID de este CVE es diferente de CVE-2019-0806, CVE-2019-0812, CVE-2019-0829, CVE-2019-0860 y CVE-2019-0861. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Chakra. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0810 https://www.zerodayinitiative.com/advisories/ZDI-19-361 • CWE-787: Out-of-bounds Write CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 7.5EPSS: 1%CPEs: 12EXPL: 0

An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles fragmented IP packets, aka "Windows TCP/IP Information Disclosure Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. Existe una vulnerabilidad de divulgación de información cuando la pila TCP/IP de Windows gestiona incorrectamente los paquetes IP fragmentados. Esto también se conoce como "Windows TCP/IP Information Disclosure Vulnerability". Esto afecta a Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10 y Windows 10 Servers. • http://www.securityfocus.com/bid/105456 http://www.securitytracker.com/id/1041843 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8493 •