Zero-day vulnerability in Windows

Privilege escalation
CVE-2016-0167

Used to  compromise organizations in the USA and Canada. First attacks were detected in 08.03.2016.

Known malware:

PUNCHBABY or PUNCHTRACK Trojan.

Vulnerability details

Advisory: SB2016041203 - Multiple vulnerabilities in Microsoft Windows

Vulnerable component: Windows

CVE-ID: CVE-2016-0167

CVSSv3 score: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Description:

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to improper handling of objects in memory by the kernel-mode driver. A local attacker can run a specially crafted program, gain elevated privileges and execute arbitrary code with SYSTEM privileges.

Successful exploitation of this vulnerability may result in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.

Known APT campaigns:

PUNCHTRACK - companies in USA and Canada

According to FireEye hackers used malware тАЬPUNCHTRACKтАЭ to steal usersтАЩ credit card data.

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.