The news of the day is that a 15-year-old vulnerability in all Microsoft systems was fixed by the last critical patch issued by the company. The vulnerability, dubbed JASBUG and coded as CVE-2015-0008, could be exploited by an attacker to remotely hijack users’ machines.
The critical vulnerability, dubbed JASBUG due to the name of the company JAS Global Advisors that discovered it,
affects the core components of the Microsoft Windows OS architecture. Both Windows clients and Servers are impacted by the JASBUG flaw, according to the researchers Microsoft took more than 12 months to develop a patch to fix the flaw.
Despite Microsoft released the patch, Windows Server 2003 systems result still vulnerable to the exploitation of the flaw. The JASBUG flaw could allow a threat actor to hijack a domain based on Windows systems if it is connected to a malicious network. The attackers could exploit the flaw to do various malicious activities, including installing programs, access with full permissions, user data, or to create new accounts with full user rights.
Microsoft, documented the patch as a part of its “Patch Tuesday” release on 10 February 2015, detailed info is available in the Microsoft Security Bulletin MS15-011.
“The vulnerability could allow remote code execution if an attacker convinces a user with a domain-configured system to connect to an attacker-controlled network. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.” states the Microsoft Advisory.
The JASBUG only affects users with a domain-configured system connected to a network controlled by bad actors, a scenario unusual for home users that for this reason are less exposed to the exploitation of the bug.
The exploitation of the JASBUG vulnerability allows threat actors to run a Man-In-The-Middle (MitM) attack between the corporate Active Directory and the clients targeted by the attackers.
The description of the attack scenario is reported in a blog post published by Microsoft.
Microsoft does a thorough job explaining the on-LAN attack scenario, “one of the typical attack scenarios.” “One of” is the operative phrase.
“These domain-joined Windows machines (i.e. members of a corporate Active Directory) are vulnerable while they’re connected to a non-trusted network without a full (default route) VPN. While they’re connected to the corporate VPN, they are not vulnerable as far as we know.” states Microsoft. ” There are a number of pre-requisites to get that to work – it certainly doesn’t work universally and it depends on some funky misconfigurations and happenstance. But it works frequently enough to be of concern. We will release the specifics of the other attack scenarios we’re aware of at some future point, but for now it’s important that folks patch and not become complacent because of a perceived on-LAN requirement. “
Exploiting the JASBUG flaw
In this attack scenario a vulnerable machine is connected to a Wi-Fi network at a coffee shop:
The Windows OS versions impacted by the JASBUG flaw are:
(Security Affairs – JASBUG, Microsoft)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.