Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/10/2018
05:10 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Issues Rare Patch for Wireless Keyboard Flaw

Patch Tuesday includes 67 fixes - the most critical of which are browser-related.

So much for a spring break: Microsoft today dropped 67 security patches in its April Patch Tuesday release, including one for a piece of one of its hardware devices, the Wireless Keyboard 850.

Hardware – and keyboard – patches are relatively rare, so the security bypass vulnerability Microsoft fixed today in the keyboard stood out among the typical security flaws, which included 24 critical bugs, 42 rated as important, and one as moderate. Microsoft rated the keyboard vuln (CVE-2018-8117) as "important."

The flaw allows an attacker to reuse the keyboard's AES encryption key in order to log keystrokes, or inject them into the affected keyboard devices. According to Microsoft, "an attacker could simulate keystrokes to send malicious commands into a victim's computer" or "read keystrokes such as passwords sent by other keyboards for the affected devices."

Such an attack would be no simple feat: it requires physical proximity, and the attacker would have to pilfer the encryption key from the vulnerable keyboard. The patch forces each wireless keyboard to generate a unique AES encryption key.

Dustin Childs, communications manager for ZDI, says keyboard patching is rare, mainly because most vendors of the hardware devices don't have the update infrastructure like Microsoft has nor the ability to track them for updates. "Microsoft has the operating system where it can update" them, Childs notes. While the attack would require some finesse and sophistication, it's still worth applying the patch in short order, albeit not as a top priority compared with other updates in this month's patch batch, according to Childs.

"If I know I have this keyboard in my enterprise, I'm not going to ignore this patch," he says, noting that open work environments would be more at risk of such an attack.

Microsoft didn't detail how an attacker would steal the encryption key. But Jimmy Graham, director of product management at Qualys, says it appears to be a hardware or side-channel attack, based on the way Microsoft is blocking access to the key with the fix.

Graham points out that most of the critical bugs patched today have to do with browsers. He recommends those patches as priority for endpoints.

Microsoft also patched five critical flaws in the Windows Font Library that each allow remote code execution via Web or file-sharing attacks. Both Graham and Childs consider these patches priorities as well. "Browser [updates] are always important and near the top" as a priority, Childs says.

The Microsoft Graphics Remote Code Execution vuln flaws: CVE-2018-1010CVE-2018-1012CVE-2018-1013CVE-2018-1015, and CVE-2018-1016 could allow an attacker to tuck malicious code into fonts. Malicious fonts can be used in Web browsing and documents and attachments.

"According to Microsoft, these vulnerabilities can be exploited through a Web-based attack, meaning the user only needs to visit a malicious Web page. This could be through a compromised site or malicious ad server," Qualys' Graham says. "The other attack vector is file-based, meaning a document could be sent via email or through a fileshare that would run the exploit if opened."

Childs says these flaws are reminiscent of the Duqu nation-state group's methods. The attackers behind Duqu embedded the Duqu dropper into type fonts via the Win32k TrueType font parsing engine. "Fonts are everywhere, so always put these" vulns at a high priority, he says.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop IT X and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.Register with Promo Code DR200 and save $200.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15820
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, the markdown parser could disclose hidden file existence.
CVE-2020-15821
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, a user without permission is able to create an article draft.
CVE-2020-15823
PUBLISHED: 2020-08-08
JetBrains YouTrack before 2020.2.8873 is vulnerable to SSRF in the Workflow component.
CVE-2020-15824
PUBLISHED: 2020-08-08
In JetBrains Kotlin before 1.4.0, there is a script-cache privilege escalation vulnerability due to kotlin-main-kts cached scripts in the system temp directory, which is shared by all users by default.
CVE-2020-15825
PUBLISHED: 2020-08-08
In JetBrains TeamCity before 2020.1, users with the Modify Group permission can elevate other users' privileges.