Microsoft Issues Zero-Day Advisory for Internet Explorer
The newly discovered flaw affects Internet Explorer 9, 10, and 11 on Windows 7 through to Windows 10, and the respective Windows Server versions. The bug could be used to take complete control of a system and install new software, read and modify data, and create new accounts with full user rights. The bug is rated critical for Windows client SKUs and moderate for Windows Server because Enhanced Security Configuration mode is enabled by default and it provides additional protection for sites not explicitly added to the Internet Explorer Trusted Sites zone.
Microsoft says that users would need to open a link to a specially crafted website for the vulnerability to be exploited. Hackers often use social engineering to persuade users to open malicious links found in emails. While the flaw is being actively exploited in the wild, Microsoft says that so far that it is aware of limited targeted attacks. A CVE has been assigned to the vulnerability (CVE-2020-0674) but there is no patch for the bug at the moment. Microsoft is working on providing a fix. Although it’s not clear whether a patch for Windows 7 will be made available for organizations not paying for Extended Security Updates (ESU), as the OS reached end-of-life January 15th.
This zero-day appears to be connected to a similar attack that was launched against Firefox users recently. Mozilla has since updated its browser to protect against the flaw. According to ZDNet’s Catalin Cimpanu, Mozilla credited Chinese cybersecurity company Qihoo 360 with reporting the bug. And apparently in a tweet this has now been deleted, Qihoo 360 said that there was also a similar flaw in Internet Explorer that was actively being exploited.
Mitigating the Internet Explorer Vulnerability
The official advice from Microsoft is to change permissions on jscript.dll. But taking this action can result in reduced functionality. The steps described in Microsoft’s security advisory involve taking ownership of the file and removing all access permissions to the DLL.
If your organization doesn’t use Internet Explorer, you could consider removing the component from Windows or using AppLocker, or a third-party application control solution, to block IE. While these methods aren’t likely to provide full protection against this zero-day, they will make it less likely that an attacker could persuade users to open a malicious site using Internet Explorer. In Windows 10, Windows Defender Application Guard, previously known as Device Guard, provides more robust application control than AppLocker.
For more information on blocking untrusted apps using AppLocker, see Block Untrusted Apps Using AppLocker on Petri.
More in Windows Server
Microsoft Confirms May 2022 Patch Tuesday Updates Cause AD Authentication Issues
May 12, 2022 | Rabia Noureen
Microsoft to Disable SMB1 File-Sharing Protocol By Default on Windows 11
Apr 20, 2022 | Rabia Noureen
Microsoft Defender for Endpoint Adds Support for Windows Server 2012 R2 and 2016
Apr 14, 2022 | Rabia Noureen
Microsoft Lets Windows Server Admins Opt-In for Automatic .NET Updates
Apr 13, 2022 | Rabia Noureen
How to Install Windows Server 2022 Step by Step
Mar 22, 2022 | Michael Reinders
Windows Server Insider Build 25075 Brings New Brute Force Attack Prevention Capabilities
Mar 17, 2022 | Rabia Noureen
Most popular on petri