Security News > 2023 > April > Windows zero-day vulnerability exploited in ransomware attacks

Windows zero-day vulnerability exploited in ransomware attacks
2023-04-11 19:23

Microsoft has patched a zero-day vulnerability in the Windows Common Log File System, actively exploited by cybercriminals to escalate privileges and deploy Nokoyawa ransomware payloads.

In light of its ongoing exploitation, CISA also added the CVE-2023-28252 Windows zero-day to its catalog of Known Exploited Vulnerabilities today, ordering Federal Civilian Executive Branch agencies to secure their systems against it by May 2nd. Tracked as CVE-2023-28252, this CLFS security flaw was discovered by Genwei Jiang of Mandiant and Quan Jin of DBAPPSecurity's WeBin Lab.

It affects all supported Windows server and client versions and can be exploited by local attackers in low-complexity attacks without user interaction.

Security researchers with Kaspersky's Global Research and Analysis Team also recently found the CVE-2023-28252 flaw exploited in Nokoyawa ransomware attacks.

"Kaspersky researchers uncovered the vulnerability in February as a result of additional checks into a number of attempts to execute similar elevation of privilege exploits on Microsoft Windows servers belonging to different small and medium-sized businesses in the Middle Eastern and North American regions," the company said in a press release.

Redmond has patched at least 32 local privilege escalation vulnerabilities in the Windows CLFS driver since 2018, with three of them also exploited in the wild as zero-days, according to Kaspersky.


News URL

https://www.bleepingcomputer.com/news/security/windows-zero-day-vulnerability-exploited-in-ransomware-attacks/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2023-04-11 CVE-2023-28252 Unspecified vulnerability in Microsoft products
Windows Common Log File System Driver Elevation of Privilege Vulnerability
local
low complexity
microsoft
7.8