{"id":12976,"date":"2019-03-14T17:36:24","date_gmt":"2019-03-14T13:36:24","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/cve-2019-0797-vulnerability-detected\/12976\/"},"modified":"2019-11-15T15:22:24","modified_gmt":"2019-11-15T11:22:24","slug":"cve-2019-0797-vulnerability-detected","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/cve-2019-0797-vulnerability-detected\/12976\/","title":{"rendered":"CVE-2019-0797: Zero-day exploits keep coming"},"content":{"rendered":"<p>At the risk of seeming monotonous, we are compelled by circumstances to report that three months after the last <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/cve-2018-8589-vulnerability-detected\/24597\/\" rel=\"noopener noreferrer nofollow\">zero-day vulnerability was found<\/a>, our proactive technologies have uncovered another Windows exploit. This time, the vulnerability affects many more versions of the operating system: 64-bit Windows 8 and 10 (up to build 15063) find themselves plumb in the danger zone. We duly notified Microsoft, and a patch was included in a system update released on March 12.<\/p>\n<p>Curiously, though, despite the continual release of updates for current versions, many users are in no hurry to install them for fear of disrupting their computers\u2019 operations. This \u201cwait and see what happens to others\u201d approach is not recommended.<\/p>\n<h2>What is CVE-2019-0797?<\/h2>\n<p>This is no less than the fourth privilege escalation exploit recently detected by our systems.  As in the case of <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/cve-2018-8589-vulnerability-detected\/24597\/\" rel=\"noopener noreferrer nofollow\">CVE-2018-8589<\/a>, it is a <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/race-condition\/\" rel=\"noopener noreferrer\">race condition<\/a> error in the win32k.sys driver (technical details are <a target=\"_blank\" href=\"https:\/\/securelist.com\/cve-2019-0797-zero-day-vulnerability\/89885\/\" rel=\"noopener noreferrer\">available on Securelist<\/a>). We know about several targeted attacks that made use of this exploit. It potentially allows intruders to gain complete control over the vulnerable system.<\/p>\n<h2>How to avoid problems<\/h2>\n<p>Our advice remains the same:<\/p>\n<ul>\n<li>Install the corresponding system update (available on the <a target=\"_blank\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0797\" rel=\"noopener noreferrer nofollow\">Microsoft website<\/a>);<\/li>\n<li>Always update software (in particular, operating systems) to the latest versions, and replace it when the support period expires, if possible;<\/li>\n<li>Use security solutions with behavioral analysis technologies.<\/li>\n<\/ul>\n<p>The technologies used to detect the exploit (Advanced Sandboxing, Anti Targeted Attack, Behavioral Detection Engine, Automatic Exploit Prevention) are deployed in the Kaspersky Security for Business solution.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Our proactive technologies detected yet another Windows exploit that was used in APT attacks.<\/p>\n","protected":false},"author":2506,"featured_media":12977,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[1928,1768,1315,268,113],"class_list":{"0":"post-12976","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cve","10":"tag-endpoint","11":"tag-exploit","12":"tag-vulnerabilities","13":"tag-windows"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cve-2019-0797-vulnerability-detected\/12976\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cve-2019-0797-vulnerability-detected\/15409\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cve-2019-0797-vulnerability-detected\/17351\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cve-2019-0797-vulnerability-detected\/15504\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cve-2019-0797-vulnerability-detected\/14187\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cve-2019-0797-vulnerability-detected\/18032\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cve-2019-0797-vulnerability-detected\/17034\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cve-2019-0797-vulnerability-detected\/22399\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cve-2019-0797-vulnerability-detected\/5779\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cve-2019-0797-vulnerability-detected\/25976\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cve-2019-0797-vulnerability-detected\/11517\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cve-2019-0797-vulnerability-detected\/10476\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cve-2019-0797-vulnerability-detected\/18744\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cve-2019-0797-vulnerability-detected\/22790\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cve-2019-0797-vulnerability-detected\/18091\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cve-2019-0797-vulnerability-detected\/22282\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cve-2019-0797-vulnerability-detected\/22218\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/vulnerabilities\/","name":"vulnerabilities"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2506"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12976"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12976\/revisions"}],"predecessor-version":[{"id":14489,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12976\/revisions\/14489"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12977"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}