New Windows IPv6 Zero-Click Vulnerability
The press is reporting a critical Windows vulnerability affecting IPv6.
As Microsoft explained in its Tuesday advisory, unauthenticated attackers can exploit the flaw remotely in low-complexity attacks by repeatedly sending IPv6 packets that include specially crafted packets.
Microsoft also shared its exploitability assessment for this critical vulnerability, tagging it with an “exploitation more likely” label, which means that threat actors could create exploit code to “consistently exploit the flaw in attacks.”
Details are being withheld at the moment. Microsoft strongly recommends patching now.
Subscribe to comments on this entry
Clive Robinson • August 16, 2024 10:29 AM
@ ALL,
Whilst various people such as the security researcher are saying,
It’s already effectively disclosed by the patch, that almost certainly has been reversed engineered by now.
So I suspect attacks are either “in progress” or “will be soon”.
The problem is that Microsoft has a long history of “patches with problems” so there is justifiable hesitancy around “Mission Critical Systems”.
Knowing the history of Microsoft and it’s acquired network code and subsequent additions I suspect that there is a reasonable probability this goes back a ways in time…
Thus those running “nolonger supported” MS OS’s might find they are going to get bitten.
For various reasons people should think about getting experience of proficiency of “segregation by layers”.
One such is run a *nix as the base OS and run MS OS’s in VM’s on it and then run your apps there.
If that will help as a mitigation in this case is “unknown” untill we “know more” but I doubt that it will make things worse.
Ultimately “pulling the plug” on external communications will be an effective mitigation. But from an “MBA in Management” perspective that will potentially be against the business being agile etc.
Hopefully enough people will patch or mitigate to prevent this popping up on the “Top Ten Most Unwanted” worms/malware but I guess we will have to wait and see.