The Download
Microsoft has addressed a critical zero-day vulnerability affecting Windows Smart App Control, originally tracked as CVE-2023-44487. Exploited since 2018, the flaw allowed attackers to bypass security protections, enabling malicious code to execute unchecked on compromised systems. Attackers leveraged this flaw to install malware, potentially gaining full control of affected devices. This highlights the importance of patching systems as soon as fixes become available, especially when vulnerabilities are actively exploited for years without detection.
Hackers have exploited the flaw, now tracked as CVE-2024-38217, to bypass Smart App Control and Mark of The Web (MOTW) that normally prevents untrusted code and applications downloaded from the Internet from running. Security researchers believe the vulnerability has been exploited by malware dating back to 2018
What You Can Do
IT administrators should immediately apply the latest security patches from Microsoft to prevent exploitation of CVE-2023-44487. Regular patch management and vulnerability management tools from ThreatMate can help mitigate vulnerabilities. Prioritizing vulnerabilities with public exploit code should be a key focus to ensure robust defense mechanisms.
To Learn More:
Comments