Zero-day vulnerability in Windows

Information disclosure
CVE-2019-0703

Exploit code for this vulnerability was detected by Symantec when analyzing the Bemstour exploit tool in September 2018. Researchers make connection between the Buckeye (APT3) group and such exploit packs as Bemstour exploit tool and DoublePulsar.

Known malware:

Bemstour exploit tool

Vulnerability details

Advisory: SB2019031206 - Multiple vulnerabilities in Microsoft Windows SMB

Vulnerable component: Windows

CVE-ID: CVE-2019-0703

CVSSv3 score: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C

CWE-ID: CWE-200 - Information Exposure

Description:

The vulnerability allows a remote authenticated attacker to gain access to potentially sensitive information.

The vulnerability exists due to the way that the Windows SMB Server handles certain requests. A remote authenticated user can gain unauthorized access to sensitive information on the system.

Note: this vulnerability has being exploited in the wild. The exploit code was detected in the Bemstour exploit tool in September 2018 and has being used by Buckeye (APT3) APT group.

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.