Vulnerabilities / Threats

4/10/2018
05:10 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Issues Rare Patch for Wireless Keyboard Flaw

Patch Tuesday includes 67 fixes - the most critical of which are browser-related.

So much for a spring break: Microsoft today dropped 67 security patches in its April Patch Tuesday release, including one for a piece of one of its hardware devices, the Wireless Keyboard 850.

Hardware – and keyboard – patches are relatively rare, so the security bypass vulnerability Microsoft fixed today in the keyboard stood out among the typical security flaws, which included 24 critical bugs, 42 rated as important, and one as moderate. Microsoft rated the keyboard vuln (CVE-2018-8117) as "important."

The flaw allows an attacker to reuse the keyboard's AES encryption key in order to log keystrokes, or inject them into the affected keyboard devices. According to Microsoft, "an attacker could simulate keystrokes to send malicious commands into a victim's computer" or "read keystrokes such as passwords sent by other keyboards for the affected devices."

Such an attack would be no simple feat: it requires physical proximity, and the attacker would have to pilfer the encryption key from the vulnerable keyboard. The patch forces each wireless keyboard to generate a unique AES encryption key.

Dustin Childs, communications manager for ZDI, says keyboard patching is rare, mainly because most vendors of the hardware devices don't have the update infrastructure like Microsoft has nor the ability to track them for updates. "Microsoft has the operating system where it can update" them, Childs notes. While the attack would require some finesse and sophistication, it's still worth applying the patch in short order, albeit not as a top priority compared with other updates in this month's patch batch, according to Childs.

"If I know I have this keyboard in my enterprise, I'm not going to ignore this patch," he says, noting that open work environments would be more at risk of such an attack.

Microsoft didn't detail how an attacker would steal the encryption key. But Jimmy Graham, director of product management at Qualys, says it appears to be a hardware or side-channel attack, based on the way Microsoft is blocking access to the key with the fix.

Graham points out that most of the critical bugs patched today have to do with browsers. He recommends those patches as priority for endpoints.

Microsoft also patched five critical flaws in the Windows Font Library that each allow remote code execution via Web or file-sharing attacks. Both Graham and Childs consider these patches priorities as well. "Browser [updates] are always important and near the top" as a priority, Childs says.

The Microsoft Graphics Remote Code Execution vuln flaws: CVE-2018-1010CVE-2018-1012CVE-2018-1013CVE-2018-1015, and CVE-2018-1016 could allow an attacker to tuck malicious code into fonts. Malicious fonts can be used in Web browsing and documents and attachments.

"According to Microsoft, these vulnerabilities can be exploited through a Web-based attack, meaning the user only needs to visit a malicious Web page. This could be through a compromised site or malicious ad server," Qualys' Graham says. "The other attack vector is file-based, meaning a document could be sent via email or through a fileshare that would run the exploit if opened."

Childs says these flaws are reminiscent of the Duqu nation-state group's methods. The attackers behind Duqu embedded the Duqu dropper into type fonts via the Win32k TrueType font parsing engine. "Fonts are everywhere, so always put these" vulns at a high priority, he says.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop IT X and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.Register with Promo Code DR200 and save $200.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1744
PUBLISHED: 2018-10-15
IBM Security Key Lifecycle Manager 2.5, 2.6, 2.7, and 3.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 148423.
CVE-2018-1747
PUBLISHED: 2018-10-15
IBM Security Key Lifecycle Manager 2.5, 2.6, 2.7, and 3.0 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 148428.
CVE-2018-18324
PUBLISHED: 2018-10-15
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.480 has XSS via the admin/fileManager2.php fm_current_dir parameter, or the admin/index.php module, service_start, service_fullstatus, service_restart, service_stop, or file (within the file_editor) parameter.
CVE-2018-18322
PUBLISHED: 2018-10-15
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.480 has Command Injection via shell metacharacters in the admin/index.php service_start, service_restart, service_fullstatus, or service_stop parameter.
CVE-2018-18323
PUBLISHED: 2018-10-15
CentOS-WebPanel.com (aka CWP) CentOS Web Panel 0.9.8.480 has Local File Inclusion via directory traversal with an admin/index.php?module=file_editor&file=/../ URI.