Vulnerabilities / Threats

4/10/2018
05:10 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Issues Rare Patch for Wireless Keyboard Flaw

Patch Tuesday includes 67 fixes - the most critical of which are browser-related.

So much for a spring break: Microsoft today dropped 67 security patches in its April Patch Tuesday release, including one for a piece of one of its hardware devices, the Wireless Keyboard 850.

Hardware – and keyboard – patches are relatively rare, so the security bypass vulnerability Microsoft fixed today in the keyboard stood out among the typical security flaws, which included 24 critical bugs, 42 rated as important, and one as moderate. Microsoft rated the keyboard vuln (CVE-2018-8117) as "important."

The flaw allows an attacker to reuse the keyboard's AES encryption key in order to log keystrokes, or inject them into the affected keyboard devices. According to Microsoft, "an attacker could simulate keystrokes to send malicious commands into a victim's computer" or "read keystrokes such as passwords sent by other keyboards for the affected devices."

Such an attack would be no simple feat: it requires physical proximity, and the attacker would have to pilfer the encryption key from the vulnerable keyboard. The patch forces each wireless keyboard to generate a unique AES encryption key.

Dustin Childs, communications manager for ZDI, says keyboard patching is rare, mainly because most vendors of the hardware devices don't have the update infrastructure like Microsoft has nor the ability to track them for updates. "Microsoft has the operating system where it can update" them, Childs notes. While the attack would require some finesse and sophistication, it's still worth applying the patch in short order, albeit not as a top priority compared with other updates in this month's patch batch, according to Childs.

"If I know I have this keyboard in my enterprise, I'm not going to ignore this patch," he says, noting that open work environments would be more at risk of such an attack.

Microsoft didn't detail how an attacker would steal the encryption key. But Jimmy Graham, director of product management at Qualys, says it appears to be a hardware or side-channel attack, based on the way Microsoft is blocking access to the key with the fix.

Graham points out that most of the critical bugs patched today have to do with browsers. He recommends those patches as priority for endpoints.

Microsoft also patched five critical flaws in the Windows Font Library that each allow remote code execution via Web or file-sharing attacks. Both Graham and Childs consider these patches priorities as well. "Browser [updates] are always important and near the top" as a priority, Childs says.

The Microsoft Graphics Remote Code Execution vuln flaws: CVE-2018-1010CVE-2018-1012CVE-2018-1013CVE-2018-1015, and CVE-2018-1016 could allow an attacker to tuck malicious code into fonts. Malicious fonts can be used in Web browsing and documents and attachments.

"According to Microsoft, these vulnerabilities can be exploited through a Web-based attack, meaning the user only needs to visit a malicious Web page. This could be through a compromised site or malicious ad server," Qualys' Graham says. "The other attack vector is file-based, meaning a document could be sent via email or through a fileshare that would run the exploit if opened."

Childs says these flaws are reminiscent of the Duqu nation-state group's methods. The attackers behind Duqu embedded the Duqu dropper into type fonts via the Win32k TrueType font parsing engine. "Fonts are everywhere, so always put these" vulns at a high priority, he says.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop IT X and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.Register with Promo Code DR200 and save $200.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
8 Ways Hackers Monetize Stolen Data
Steve Zurier, Freelance Writer,  4/17/2018
Securing Social Media: National Safety, Privacy Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  4/19/2018
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Sara Peters, Senior Editor at Dark Reading,  4/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.