Zero-day vulnerability in Windows
The vulnerability was exploited by APT37 in late October 2022 against South Korea.
Advisory: SB2022110809 - Remote code execution in Microsoft Windows Scripting Languages
Vulnerable component: Windows
CVSSv3 score: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
CWE-ID: CWE-119 - Memory corruption
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content within the JScript9 engine. A remote attacker can trick the victim into visiting a malicious website, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note, the vulnerability is being actively exploited in the wild.
Known APT campaigns:
Seoul Yongsan Itaewon accident spear phishing
On October 31, 2022, multiple submitters from South Korea reported new malware by uploading
a Microsoft Office document to VirusTotal. The document, titled тАЬ221031 Seoul Yongsan Itaewon accident response situation (06:00).docxтАЭ, references the tragic incident in the neighborhood of Itaewon, in Seoul, South Korea during Halloween celebrations on October 29, 2022. This incident was widely reported
on, and the lure takes advantage of widespread public interest in the accident.
Indicators of compromise (IOCs)
Remote RTF template: