{"uuid": "fd1a93b3-2d1e-4db2-8086-006daebfdb2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-0986", "type": "seen", "source": "https://t.me/information_security_channel/15886", "content": "Critical Vulnerability Patched in Microsoft Malware Protection Engine\nhttp://feedproxy.google.com/~r/Securityweek/~3/euIzaFzYPfw/critical-vulnerability-patched-microsoft-malware-protection-engine\n\nAn update released this week by Microsoft for its Malware Protection Engine patches a vulnerability that can be exploited to take control of a system by placing a malicious file in a location where it would be scanned.\nThe Microsoft Malware Protection Engine provides scanning, detection and cleaning capabilities for security software made by the company. The engine is affected by a flaw that can be exploited for remote code execution when a specially crafted file is scanned.\nThe malicious file can be delivered via a website, email or instant messenger. The Malware Protection Engine will automatically scan the file (if real-time protection is enabled) and allow the attacker to execute arbitrary code in the context of the LocalSystem account, which can lead to a complete takeover of the targeted system.\nOn systems where real-time scanning is not enabled, the exploit will still get triggered, but only when a scheduled scan is initiated.\nThe vulnerability, tracked as CVE-2018-0986 (https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986) and rated \u201ccritical,\u201d affects several Microsoft products that use the Malware Protection Engine, including Exchange Server, Forefront Endpoint Protection 2010, Security Essentials, Windows Defender, and Windows Intune Endpoint Protection.\nWhile the flaw is dangerous and easy to exploit, Microsoft believes exploitation is \u201cless likely.\u201d The company pointed out that the patch for this vulnerability will be automatically delivered to customers within 48 hours of release \u2013 users and administrators do not have to take any action.\nGoogle Project Zero researcher Thomas Dullien, aka \u201cHalvar Flake,\u201d has been credited for finding CVE-2018-0986. The details of the vulnerability have yet to be disclosed, but considering that the patch is being delivered automatically to most systems, the information will likely become available soon.\nThis is not the first time Google Project Zero researchers have discovered critical vulnerabilities in Microsoft\u2019s Malware Protection Engine. While Google may occasionally disclose flaws in Microsoft products before patches become available (https://www.securityweek.com/google-discloses-unpatched-edge-vulnerability), in the case of the Malware Protection Engine, Microsoft typically releases patches within a few days (https://www.securityweek.com/microsoft-fixes-antimalware-engine-flaw-found-google-experts) or weeks (https://www.securityweek.com/microsoft-patches-several-malware-protection-engine-flaws).\nA similar flaw (https://www.securityweek.com/microsoft-patches-critical-vulnerability-malware-protection-engine) in the Malware Protection Engine was also found recently by employees of UK's National Cyber Security Centre (NCSC).\nRelated: Microsoft Releases More Patches for Meltdown, Spectre (https://www.securityweek.com/microsoft-releases-more-patches-meltdown-spectre)\nRelated: Microsoft Patches for Meltdown Introduced Severe Flaw (https://www.securityweek.com/microsoft-patches-meltdown-introduced-severe-flaw-researcher)\nRelated: Microsoft Patches 50 Flaws in Windows, Office, Browsers (https://www.securityweek.com/microsoft-patches-50-flaws-windows-office-browsers)", "creation_timestamp": "2018-04-04T17:55:22.000000Z"}