Zero-day vulnerability in Windows

Information disclosure

Exploit code for this vulnerability was detected by Symantec when analyzing the Bemstour exploit tool in September 2018. Researchers make connection between the Buckeye (APT3) group and such exploit packs as Bemstour exploit tool and DoublePulsar.

Known malware:

Bemstour exploit tool

Vulnerability details

Advisory: SB2019031206 - Multiple vulnerabilities in Microsoft Windows SMB

Vulnerable component: Windows

CVE-ID: CVE-2019-0703

CVSSv3 score: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C

CWE-ID: CWE-200 - Information Exposure


The vulnerability allows a remote authenticated attacker to gain access to potentially sensitive information.

The vulnerability exists due to the way that the Windows SMB Server handles certain requests. A remote authenticated user can gain unauthorized access to sensitive information on the system.

Note: this vulnerability has being exploited in the wild. The exploit code was detected in the Bemstour exploit tool in September 2018 and has being used by Buckeye (APT3) APT group.