Microsoft Confirms Zero-Day Exploitation of IE Vulnerability CVE-2024-43461

17 Sep 2024

Microsoft recently provided an update regarding a previously disclosed vulnerability in Internet Explorer, confirming that the flaw, identified as CVE-2024-43461, was exploited as a zero-day before it could be patched. This security issue, rated 8.8 out of 10 on the CVSS severity scale, was initially described as an “important” spoofing flaw, and Microsoft had previously stated that it was not exploited in the wild.

Details of the Vulnerability

The vulnerability allows an attacker to obscure the true file-type extension of a downloaded file in Internet Explorer, using non-printing braille Unicode characters to mislead users into opening what appears to be a harmless file. In reality, this could execute malicious code on the user’s system. To effectively exploit this flaw, an attacker would likely need to combine it with other vulnerabilities.

This particular issue, a Windows MSHTML platform spoofing vulnerability, was reported to Microsoft by Peter Girnus from Trend Micro’s Zero Day Initiative (ZDI). According to ZDI, the flaw permits remote attackers to execute arbitrary code on affected Windows installations, requiring user interaction through visiting a malicious page or opening a harmful file.

Microsoft’s internal team, including Michael Macelletti, Naiyi Jiang, and an individual known only as “Adel,” also contributed to the discovery of CVE-2024-43461. It has since been revealed that this vulnerability was previously exploited by a malware-spreading group known as Void Banshee, which leveraged it in conjunction with another vulnerability, CVE-2024-38112, to compromise victims’ systems.

The Exploit Chain

CVE-2024-38112, which was patched in July, allowed attackers to use a specially crafted Windows Internet Shortcut file to open a specific URL in the now-retired Internet Explorer. Void Banshee exploited this vulnerability to trigger CVE-2024-43461, tricking users into executing a malicious HTML Application (.hta) file disguised as an innocuous download. This ultimately led to the deployment of the info-stealing Atlantida malware on the victims’ machines, allowing attackers to exfiltrate sensitive data, including saved website credentials.

In July, Microsoft acknowledged Haifei Li from Check Point Research for discovering CVE-2024-38112, although ZDI also asserted that it deserved recognition for its role in uncovering the flaw. The complexities surrounding these vulnerabilities highlight the collaborative nature of cybersecurity research, where multiple entities contribute to identifying and reporting threats.

Recent Developments

Fast forward to this month, ZDI disclosed the file-type spoofing flaw on July 19, with Microsoft issuing a fix on September 10. Shortly thereafter, Microsoft updated its advisory to confirm that CVE-2024-43461 had been exploited in conjunction with CVE-2024-38112 prior to the July patch.

In a statement, Microsoft noted that the patch for CVE-2024-38112 was intended to disrupt the exploit chain, urging customers to apply both the July and September updates for comprehensive protection. However, ZDI indicated that the July patch did not fully eliminate the vulnerability, necessitating the subsequent update to address the file-extension issue and the reactivation of Internet Explorer.

Dustin Childs, head of threat awareness at ZDI, expressed satisfaction with Microsoft’s acknowledgment of the file-extension-hiding bug, emphasizing the importance of accurate threat reporting for network defenders. He noted that the exploit utilized a combination of vulnerabilities, and while Microsoft believed the July patch was sufficient, it left certain attack vectors unprotected.

As the cybersecurity landscape continues to evolve, the collaboration between organizations like Microsoft, ZDI, and Check Point Research plays a crucial role in enhancing defenses against emerging threats.

There is a problem with this website's security certificate internet explorer?

If you encounter a security certificate issue in Internet Explorer, it might be due to an expired certificate, a mismatch in the website's address, or the certificate not being from a trusted authority. To resolve this, check your system clock for accuracy, and try updating your browser. You can also manually install the certificate by clicking 'Continue to this website (not recommended),' then clicking on 'Certificate Error' in the address bar, and 'View certificates.' Choose 'Install Certificate' and follow the prompts. Note that this can be risky if the site is not trustworthy.

How to save webpage as pdf in internet explorer?

To save a webpage as a PDF in Internet Explorer, you can use a built-in print option or third-party software. Using Internet Explorer's built-in option: 1. Open the desired webpage. 2. Press 'Ctrl+P' to open the Print dialog box. 3. Select 'Microsoft Print to PDF' from the list of printers. 4. Click 'Print.' 5. Choose the destination folder and filename, then click 'Save.' Alternatively, you can use browser extensions or third-party PDF printers for more features and flexibility.
delicious Buttons for Internet Explorer

delicious Buttons for Internet Explorer download for free to PC or mobile

Latest update delicious Buttons for Internet Explorer download for free for Windows PC or Android mobile

5
1026 reviews
2832 downloads

News and reviews about delicious Buttons for Internet Explorer

18 Sep 2024

Void Banshee Exploits Old IE11 Vulnerabilities to Steal Sensitive Data

Cybercriminal group Void Banshee exploits Internet Explorer 11 vulnerabilities CVE-2024-43461 and CVE-2024-38112, targeting systems in Europe, North America, and Southeast Asia. They use .url and disguised .hta files to install Atlantida InfoStealer. Security solutions like Symantec's offer protection.

Read more

17 Sep 2024

Microsoft Confirms Zero-Day Exploitation of IE Vulnerability CVE-2024-43461

Microsoft confirmed that the vulnerability CVE-2024-43461 in Internet Explorer was exploited as a zero-day before it could be patched. Rated 8.8 on the CVSS scale, this flaw allows attackers to obscure file-type extensions, potentially executing malicious code. Microsoft urges users to apply updates.

Read more

27 Jul 2024

New Internet Explorer Vulnerability Poses Risk; Microsoft Issues Patch

A new vulnerability exploiting Internet Explorer code in millions of PCs poses a risk to user data and system integrity. The US government has added it to its Known Exploit Vulnerability catalog. Microsoft urges users to update Windows systems promptly to protect against potential attacks.

Read more

16 Jul 2024

Microsoft and US Agencies Issue Urgent Updates for Zero-Day Attack

A new zero-day attack targeting Windows 10 and 11 has been discovered, exploiting Internet Explorer. Microsoft and US federal agencies have issued urgent update mandates to protect against ransomware and other malware. Users are advised to update their Windows PC to disable the threat.

Read more