kras99 - stock.adobe.com

Windows zero day patched but exploitation activity unclear

Avast threat researchers detected exploitation of a Windows zero-day flaw in the wild, and organizations are being urged to patch the flaw immediately.

A recently patched Windows zero-day vulnerability was exploited in the wild, though the scope of the threat activity remains unclear.

The Advanced Local Procedure Call elevation of privilege vulnerability, tracked as CVE-2023-21674, was one of 98 flaws included in January's Patch Tuesday and could allow an attacker to gain system privileges. While Microsoft released a fix, which was first discovered by antivirus vendor Avast, it is listed as "exploitation detected" under the tech giant's vulnerability guide.

In a Twitter post Tuesday, Avast urged users to patch CVE-2023-21674, noting that its threat research team discovered active exploitation affecting a wide range of Windows versions, including 10 and 11.

Exploitation was discovered using Avast's anti-exploit engine, which monitors for suspicious behavior and detects indicators of ongoing exploitation activity, said Jan Vojtěšek, malware researcher at Avast. However, he also said CVE-2023-21674 is likely just one piece to a larger puzzle.

"We observed an active exploitation of the vulnerability and also can say that the vulnerability is likely part of a longer infection chain through [a] browser. Because for the CVE-2023-21674 exploit to work, the attackers already had to somehow obtain the ability to run arbitrary native code inside a sandboxed renderer process," Vojtěšek said in an email to TechTarget Editorial. "This is something that is normally not possible against a fully patched browser unless the attackers possess a separate rendered 0-day exploit."

Despite discovering the exploitation activity around CVE-2023-21674, Vojtěšek said Avast does not yet have the full exploit chain.

Microsoft credited Vojtěšek and two other Avast threat researchers for discovering and reporting the zero-day vulnerability.

Next Steps

Nokoyawa ransomware exploits Windows CLFS zero day

Dig Deeper on Threats and vulnerabilities

Networking
CIO
Enterprise Desktop
  • Understanding how GPOs and Intune interact

    Group Policy and Microsoft Intune are both mature device management technologies with enterprise use cases. IT should know how to...

  • Comparing MSI vs. MSIX

    While MSI was the preferred method for distributing enterprise applications for decades, the MSIX format promises to improve upon...

  • How to install MSIX and msixbundle

    IT admins should know that one of the simplest ways to deploy Windows applications across a fleet of managed desktops is with an ...

Cloud Computing
ComputerWeekly.com
Close