The vulnerability was reported by Anton Ivanovn of Kaspersky.
Used by ScarCruft hacking team in Operation Daybreak and Operation Erebus as suggested by Kaspersky Lab.
It has been used in targeted attacks carried out by a new ScarCruft APT group operating primarily against high-profile victims in China, South Korea, India, Russia, Nepal, Romania, and Kuwait.
Vulnerable component: Adobe Flash Player
CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling .swf files. A remote attacker can create a specially crafted SWF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
Known APT campaigns:
The Operation Daybreak is a malicious APT campaign that has being launched in March 2016. According to Kaspersky Lab, the campaign was executed by the ScarCruft APT.
The attackers were using spear-phishing emails to target high profile victims. The victim received an email with a malicious link to a compromised website. The compromised website contained an exploit kit, which performed a couple of browser checks before redirecting the visitor to a server controlled by the attackers hosted in Poland.
Latest references in media:
- APT Trends Report Q2 2018 [2018-07-10 12:00:56]
- North Korean APT Group Employed Rare Zero-Day Attack [2018-02-08 00:20:03]
- FruityArmor APT Group Used Recently Patched Windows Zero Day [2016-10-20 13:32:59]
- FruityArmor APT Group Used Windows Zero Day to Escape Sandboxes [2016-10-20 13:03:54]
Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.