Kaspersky Discovers Zero-Day Exploit in Desktop Window Manager

Sourced from International IDEA

Kaspersky has discovered another zero-day exploit, however, researchers are currently unable to link this exploit to any known threat actor.

This kind of vulnerability is basically an unknown software bug – upon identification and discovery, they allow attackers to conduct malicious activities in the shadows, resulting in unexpected and destructive consequences.

While analysing the CVE-2021-1732 exploit, Kaspersky researchers found another such zero-day exploit and reported it to Microsoft in February. After confirmation that it is indeed a zero-day, it received the designation CVE-2021-28310.

According to the researchers, this exploit is used in the wild, potentially by several threat actors. It is an escalation of privilege (EoP) exploit, found in Desktop Window Manager, allowing the attackers to execute arbitrary code on a victim’s machine.

It is likely that the exploit is used together with other browser exploits to escape sandboxes or obtain system privileges for further access.

Kaspersky’s initial investigation has not revealed the full infection chain, so it is yet not known whether the exploit is used with another zero-day or coupled with known, patched vulnerabilities.

“The exploit was initially identified by our advanced exploit prevention technology and related detection records,” says Boris Larin, security expert at Kaspersky.

“In fact, over the past few years, we have built a multitude of exploit protection technologies into our products that have detected several zero-days, proving their effectiveness time and time again. We will continue to improve defences for our users by enhancing our technologies and working with third-party vendors to patch vulnerabilities, making the Internet more secure for everyone.”

A patch for the elevation of privilege vulnerability CVE-2021-28310 was released in April 2021. 

Edited by Jenna Delport
Follow Jenna Delport on Twitter

Follow IT News Africa on Twitter