1 min read

Hiding in Plain Site: 20 Year Old Windows Exploit Patched...

Featured Image

Security7-Blog Image

In the words of the immortal Charlie Brown; good grief.

A Windows exploit that's been around for almost 20 years was finally patched last week.

Apparently every single version of Windows has had this vulnerability.  The vulnerability is a part of a legacy protocol called CTF. CTF is a part of the Windows Text Services Framework.  CTF is used to control things like keyboard layout, text input methods, etc.

The flaw allows a would-be attacker to compromise an app, like the Notes app for example, and then launch other programs that run CTF. That could potentially include your internet browser.

The flaw was discovered by Tavis Ormandy, a researcher who's a part of Google's Project Zero. Ormandy's been in the news for discovering other major flaws.

Ormandy first reached out to Microsoft regarding the vulnerability in May but the software giant seemed to ignore his findings. After waiting nearly three months for a response Ormandy finally released his findings on his own blog. You can read what he said in depth here.

As I said above, Microsoft did finally release an update that fixes the problem. If you haven't patched your systems yet we recommend doing so.


Dark Utilities: Off the shelf Command-And-Control Attacks...

Entities offering Cyberattacks-as-a-Service are fairly common and the newest member of the club, called Dark Utilities, is gaining popularity quickly.

Read More

What is a Managed Cybersecurity Services Provider?

We talk a lot about being a Managed Cybersecurity Services Provider and I thought it'd be a good idea to dive into exactly what a Managed...

Read More

Check Out or New Social Engineering Attack Guide!

We've been warning people for YEARS regarding the dangers posed by Social Engineering Attacks. We decided it was time to collect all of that...

Read More