The vulnerability was reported by Anton Ivanov from Kaspersky Lab. The vulnerability was used by the ScarCruft group in Operation Daybreak campaign.
Used in Angler Exploit Kit.
Vulnerable component: Adobe Flash Player
CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
CWE-ID: CWE-190 - Integer Overflow or Wraparound
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to integer overflow. A remote attacker can create a specially crafted Web site, trick the victim into visiting it and execute arbitrary code with privileges of the current user.Successful exploitation of the vulnerability results in arbitrary code execution.
Known APT campaigns:
The Operation Daybreak is a malicious APT campaign that has being launched in March 2016. According to Kaspersky Lab, the campaign was executed by the ScarCruft APT.
The attackers were using spear-phishing emails to target high profile victims. The victim received an email with a malicious link to a compromised website. The compromised website contained an exploit kit, which performed a couple of browser checks before redirecting the visitor to a server controlled by the attackers hosted in Poland.
Latest references in media:
- Serious flaws in Western Digital My Cloud NAS devices allow attackers to fully control them [2017-03-08 09:00:29]
- Unpatched Western Digital Bugs Leave NAS Boxes Open to Attack [2017-03-07 20:00:58]
- WD Patches Vulnerabilities in "My Cloud" Products [2017-01-25 16:00:18]
- Adobe Flash Player flaws remain the most used by Exploit Kits [2016-12-06 21:24:26]
- FruityArmor APT Group Used Recently Patched Windows Zero Day [2016-10-20 13:32:59]
- FruityArmor APT Group Used Windows Zero Day to Escape Sandboxes [2016-10-20 13:03:54]
Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.