New Windows IPv6 Zero-Click Vulnerability

The press is reporting a critical Windows vulnerability affecting IPv6.

As Microsoft explained in its Tuesday advisory, unauthenticated attackers can exploit the flaw remotely in low-complexity attacks by repeatedly sending IPv6 packets that include specially crafted packets.

Microsoft also shared its exploitability assessment for this critical vulnerability, tagging it with an “exploitation more likely” label, which means that threat actors could create exploit code to “consistently exploit the flaw in attacks.”

Details are being withheld at the moment. Microsoft strongly recommends patching now.

Posted on August 16, 2024 at 7:07 AM13 Comments

Comments

Clive Robinson August 16, 2024 10:29 AM

@ ALL,

Whilst various people such as the security researcher are saying,

“Considering its harm, I will not disclose more details in the short term

It’s already effectively disclosed by the patch, that almost certainly has been reversed engineered by now.

So I suspect attacks are either “in progress” or “will be soon”.

The problem is that Microsoft has a long history of “patches with problems” so there is justifiable hesitancy around “Mission Critical Systems”.

Knowing the history of Microsoft and it’s acquired network code and subsequent additions I suspect that there is a reasonable probability this goes back a ways in time…

Thus those running “nolonger supported” MS OS’s might find they are going to get bitten.

For various reasons people should think about getting experience of proficiency of “segregation by layers”.

One such is run a *nix as the base OS and run MS OS’s in VM’s on it and then run your apps there.

If that will help as a mitigation in this case is “unknown” untill we “know more” but I doubt that it will make things worse.

Ultimately “pulling the plug” on external communications will be an effective mitigation. But from an “MBA in Management” perspective that will potentially be against the business being agile etc.

Hopefully enough people will patch or mitigate to prevent this popping up on the “Top Ten Most Unwanted” worms/malware but I guess we will have to wait and see.

Clive Robinson August 16, 2024 10:58 AM

@ ALL,

Oh I forgot to mention “The Register” in,

https://www.theregister.com/2024/08/14/august_patch_tuesday_ipv6/

Call this vulnerability,

“Holy grail security flaw”

In their usual cheerful way before saying,

“It’s pretty bad; it’s a 9.8-out-of-10 on the CVSS severity scale.”

So… Yeh as they say in “Guzz under” land in that droll way,

“No worries mate, it needs no fan.”

Then they go on to say there is another 9.8 on the CVSS severity scale…

Then go on to mention another couple of critical RCE’s…

Now I know that the first couple of weeks of August are known as the “silly season” in MSM circles because generally it’s a quiet time so news reporters are scratching around for anything that will “space fill” so even mention “Grand Ma’s Chocolate Cake” winning the local church fair, even if it does not poison the judges…

But Microsoft’s cake appears to have blown that out of the water… with something that although brown and squidgy, is probably not chocolate frosting…

So say after me,

“What is the actual business case for that computer to have external communications?”

And if the reply is,

“To stop Win11 barfing up”

Then guess what…

cybershow August 16, 2024 12:16 PM

Microsoft strongly recommends patching now

With the Crowdstrike snafu only a couple of weeks ago
Windows users are going to be conflicted. Don’t patch and be exposed to malice,
or run an update and risk incompetence bricking your system?

It’s more than the infuriating logic of Heller’s Catch 22,
It is about facing the absurd.
Clown Computing

Dave August 16, 2024 11:55 PM

IPv6 packets that include specially crafted packets

Is that like entering your PIN number at an ATM machine?

Clive Robinson August 17, 2024 8:26 AM

@ , ALL,

Re : CyberStrike SNAFU.

As you note,

“With the Crowdstrike snafu only a couple of weeks ago Windows users are going to be conflicted.”

But CrowdStrike is just the latest in a long stream of such patch and update issues.

Which is why the traditional advice was have a “lab” separate to your live systems where you did a

“Cautious add and test deeply before deployment.”

Which in general non adversarial or opponent with agency scenarios is the sensible way to proceed.

But now opponents with agency are apparently able to turn an update / patch release into a working attack or get an attack out within an hour or less of patch release things have changed somewhat.

It can be argued quite reasonably from a technical aspect the sensible thing is still to “use a test lab”, only now you use a “hard mitigation” of “Go off line” untill the tests are completed.

However that plays merry hell with the availability figures, and the way things are going currently with malware etc your systems would be unavailable for ever increasing periods and possibly upto half the time already…

One partial solution to the frequency of hard mitigations is to significantly reduce complexity of the hosts.

However as far as commercial / consumer OS and Apps are concerned the Software Industry want’s to needlessly drive up complexity for shall we call it “Marketing Reasons”.

Thus we get a game of “Russian Roulette” played on mass virtually every day with the not unexpected result that “sometimes the hammer drops and a scream in the night is heard”.

Thus people are actively asking at one end of the scale,

How to reduce complexity and thus the likelihood any configuration is vulnerable.

And at the other end,

On the assumption they will be hit, how they reduce the risk to little more than annoyance.

As with most things that sit on a scale or in a spectrum, there is a “sweet-spot” that moves as things change, so it’s an ever changing game of catch up you can never win called “A red Queen’s Race” or “The hamster wheel of pain” depending on your background and current state of your spleen which leaves open the door on some more choice phrases that are very much NSFW.

The obvious answer is to direct the pain to where it originates, but those senior execs in the Software Industry put a lot of effort and resources into ensuring that does not happen, and I’m sure the legislators et al are most thankful for that.

Thus the question arises as to where the pain threshold is for them. That is at what point does the harm they cause so rile society that the call for this madness to stop gets to a point where things have to be done.

We are at a point with Alphabet/Google where an opportunity exists, but past history suggests that the ball will be dropped in return for a few meaningless headlines and a small fraction of profits as a fine that will just be written off against taxes one way or another.

Who? August 17, 2024 1:16 PM

From Kunlun Lab’s XiaoWei: blocking IPv6 on the local Windows firewall won’t block exploits because the vulnerability is triggered prior to it being processed by the firewall.

May I ask what Microsoft understands for a “firewall”? How can a packet be processed before firewall’s rules having a chance to decide if the packet itself is acceptable or not?

A firewall should be the first line of defense, precisely to avoid vulnerabilities like this one. It cannot —should not— be considered a secondary security layer.

JonKnowsNothing August 17, 2024 10:36 PM

@Who?

re:How can a packet be processed before firewall’s rules

Generically, from the time you press ENTER to send a packet, there are a tonnage of places where the packet is scanned and deep inspected long before it hits the firewall located nearest to you (your most active one).

Packets are not a single “data” item, the data is broken up into mini-box cars and formatted according to the internet protocol being used. The packet train is set in motion but each box car can be sent along a different track towards the destination. Each transit point will inspect the packet to see if it needs to be forwarded or discarded. At the end point the min-box car train is reassembled and delivered to you as if no one has ever looked at it.

Everyone has looked at it. Everyone has parsed it. Lots of people have copied it. And anyone wanting to fudge it has had amble opportunity to fudge away.

ResearcherZero August 18, 2024 6:55 AM

@Who?

The vulnerability lies in the handling of IPv6 packets by the Windows TCP/IP stack.
The Windows TCP/IP stack does not sufficiently validate certain packets.

A buffer overflow is when a buffer’s storage capacity is exceeded by a to-large quantity of data. Many programming languages do not perform any automatic bounds checking.

Preventing buffer overflows can be much more difficult than it might seem.

‘https://www.welivesecurity.com/2021/12/06/what-are-buffer-overflow-attacks-how-are-they-thwarted/

The Morris worm exploited a buffer overflow in 1988 to propagate itself.

There is a good example of how that took place here:

https://arstechnica.com/information-technology/2015/08/how-security-flaws-work-the-buffer-overflow/

There is also a use-after-free in the Windows Reliable Multicast Transport Driver

‘https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38140

EDR and AV software have also been shown to contain vulnerabilities themselves.

Payload drops a vulnerable drivers to gain privileges sufficient to unhook an EDR tool’s protection…

‘https://news.sophos.com/en-us/2024/08/14/edr-kill-shifter/

“Keeping track of what software versions and drivers are old and shouldn’t be installed would quickly become another antivirus signature database-tracking problem, where the vendors were always behind the 8-ball trying to keep up with what’s the latest.”

https://www.darkreading.com/endpoint-security/ransomhub-rolls-out-brand-new-edr-killing-byovd-binary

Polymorphic malware or other techniques have also bypassed AV and EDR protections.

‘https://www.safebreach.com/blog/safebreach-labs-researcher-discovers-multiple-zero-day-vulnerabilities/

ResearcherZero August 18, 2024 7:53 AM

@Who?

The TCP/IP model divides its data into packets and combines them at the other end.

The Internet Layer assigns an IP address to each packet and uses routing tables to determine the best route for the packet to take to reach its destination. The packet is then forwarded to the next hop on its route until it reaches its destination. When all of the packets have been delivered, they are then reassembled.

Any bugs in how Microsoft’s TCP/IP stack handles packets must be addressed by Microsoft.

‘https://3ev.medium.com/the-life-of-a-packet-c80857054b04

Instead of using a hard-coded default receive window size, TCP adjusts to even increments of the maximum segment size (MSS).

The TCP receive window size is the amount of receive data (in bytes) that can be buffered during a connection. The sending host can send only that amount of data before it must wait for an acknowledgment and window update from the receiving host. The MSS is negotiated during connection setup.

https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/description-tcp-features

ResearcherZero August 18, 2024 8:25 AM

Two thirds of 0-day exploits detected in the wild used memory corruption vulnerabilities.

Microsoft has been contemplating the virtues of Rust since at least 2019.

‘https://www.theregister.com/2024/06/28/cisa_open_source/

Shifting to safer languages is a slow and long-term process…

Concerns regarding memory safety have been around for more than 50 years.
https://www.darkreading.com/application-security/white-house-switch-memory-safe-languages

“These bugs could lead to accessing private data, corrupting data, or even executing code that isn’t part of a program.”

But it doesn’t have to be this way.

‘https://spectrum.ieee.org/memory-safe-programming-languages

JonKnowsNothing August 18, 2024 1:07 PM

@ResearcherZero, @Who?

re: The TCP/IP model divides its data into packets and combines them at the other end.

While this particular vulnerability resides in the IPV6 packet stream, it would be best to remember that this same framework exists in nearly every computer exchange between client-terminal and server-mainframe. It is not just a TCP/IP protocol issue.

Any data going “across a wire” has a framework, from telephony to the International Space Station. Some frameworks are public in definition and others are hidden such as MIL-SPEC applications. They all have to have a similar layout although the individual compartments (aka box cars) might have a different definition or organization and there maybe a different number of required boxcars.

In addition, the train and boxcars which are traveling along different data pathways they also require a set of ACK-NAK exchanges outside of the boxcar wrapper. This is the Red Light Green Light exchange normally thought of as happening at the initiator and termination locations but they also occur in between.

ResearcherZero August 20, 2024 2:49 AM

@JonKnowsNothing

Imagine how packets might enter an adapter and that somehow magical security can be applied. It’s no easy feet as it happens at a very low level. TCP is also designed to operate in a manner that is fast and efficient, otherwise no high speed internet.

This is an interesting article on making TCP work while keeping latency down:

‘https://ably.com/blog/optimizing-global-message-transit-latency-a-journey-through-tcp-configuration

UDP just quirts the data out like a jet of hot diarrhea and hopes it is received well.

UDP is faster because it does not have to ensure reliable data delivery and directly sends packets to the receiver without first establishing a connection. UDP does not keep track of what was sent, leaving the error correction and other requirements to the application.

TCP on the other hand has to deal with out-of-order, lost packets and both maintaining a reliable connection, while ensuring the message reaches the receiver intact.

A lot of how networking actually works, including the TCP stack, is pretty complicated.
Much of it was originally coded a long time ago, like the parts of the Linux kernel for example, that make this stuff work, and written in languages like C or Assembly.

It’s pretty amazing it actually still works as well as it does.

None of the spiffy new tech existed back when these specs were invented.
https://networkencyclopedia.com/transmission-control-protocol-tcp/

ResearcherZero August 20, 2024 3:26 AM

@JonKnowsNothing

That is a good analogy. Better than plate analogy or sending letters to mailboxes.

It is a good excuse to enforce new logins, MFA and ensure good authentication practices.
I’m sure it could be used as a way to terrify people to agree to better security practices.

“If you do not do this, all your trains and boxcars will leave the tracks, roll through a childcare centre, through the primary school next door, and into the petrol station!”

The whole OSI model is far too complicated to explain to the average person. It has too many moving parts..

Layer 1: Data is transferred as a stream of binary digits – 0 or 1 … 5v =

…and everyone stopped listening

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.