Hackers Are Exploiting Previously Undisclosed Windows Vulnerability

Microsoft has discovered a new vulnerability that is being exploited by attackers in all supported versions of Windows.

The previously undisclosed vulnerability affects Windows 10 as well. There is currently no patch available for the vulnerability, but Microsoft is actively working on a fix (via TechCrunch).

Windows Intelligence In Your Inbox

Sign up for our new free newsletter to get three time-saving tips each Friday — and get free copies of Paul Thurrott's Windows 11 and Windows 10 Field Guides (normally $9.99) as a special welcome gift!

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

[ad unit=’in_content_premium_block’]

The security vulnerability is to do with the Adobe Type Manager Library in Windows. “Two remote code execution vulnerabilities exist in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font – Adobe Type 1 PostScript format,” notes Microsoft.

Attackers can exploit the vulnerability by luring users into open or preview a “specially crafted” document which, when opened, could allow the attacker to remotely run malware on the user’s device.

Microsoft has provided some possible workarounds for the issue here.

The more worrying problem here is that Microsoft says it is aware of “limited target attacks” that are leveraging this vulnerability and has listed it as a critical vulnerability. Microsoft will be releasing a fix for this issue for all supported versions of Windows — however, it won’t be releasing the fix for the regular, non-enterprise version of Windows 7 as it’s already reached end of support earlier this year.

Tagged with

Share post

Please check our Community Guidelines before commenting

Conversation 4 comments

  • wright_is

    Premium Member
    24 March, 2020 - 9:37 am

    <p>What is confusing is that it is rated as critical on all versions of Windows 10, yet the affected library isn't even installed on machines after Windows 10 1709… How can they be critically vulnerable, if the library with the critical flaw isn't even on the PC in question?</p><p>Tilt…</p>

    • phil_adcock

      24 March, 2020 - 12:53 pm

      <blockquote><a href="#533427"><em>In reply to wright_is:</em></a><em>I believe this would be due to the fact that Windows 10 still has that library in some version. As we continue to hear, PC's are not being upgraded as quickly as Microsoft would like. While your machine and my machine may be up to date. From a business stand point looking at who may be affected (Medical offices, hospitals, larger corporations.) and with a large portion of people who usually work in the office working from home… I would say critical was the appropriate flag so a solution can be implemented as quickly as possible. </em></blockquote><p><br></p>

      • crfonseca

        Premium Member
        24 March, 2020 - 1:12 pm

        <blockquote><em><a href="#533534">In reply to Phil_Adcock:</a></em></blockquote><p>Also, while it's not installed in newer versions, if you're upgrading from an older version that did install it, it'll probably still be in there somewhere.</p><p>This didn't use to be an issue when upgrading Windows meant getting an entire new PC with the new version of Windows pre-installed, but with Windows 10 Microsoft really wants everyone to upgrade to the latest version of Windows on top of the previous versions. </p>

      • wright_is

        Premium Member
        25 March, 2020 - 8:16 am

        <blockquote><em><a href="#533534">In reply to Phil_Adcock:</a></em></blockquote><p>Microsoft's mitigation for Windows 10 doesn't work on any of the machines I've looked at. The files you need to rename just don't exist.</p><p><br></p><p>@crfonseca I've checked PCs back to about 2016 and I haven't found any with the DLL yet. But I expect it is on older PCs that upgraded from Windows 7/8 and have been upgraded within 10 since then.</p>

Windows Intelligence In Your Inbox

Sign up for our new free newsletter to get three time-saving tips each Friday

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Thurrott © 2024 Thurrott LLC