Overview:
A remote code execution vulnerability exists in Microsoft SharePoint. This vulnerability, tracked as CVE-2019-0604 was reported by Markus Wulftange. This vulnerability was rated critical. However, no exploits were seen at the time of release.
Now, a number of organizations reported active exploits of this vulnerability in regions of Canada and Middle East where the initial infection was achieved using a China Chopper web-shell. AlienLabs found malware samples (https://pastebin.com/bUFPhucz) that could be an earlier version of the malware which is capable of executing commands and also uploading or downloading files. Reports indicate that this malware linked to FIN7 group. For more info please refer our blog
CVSS v3.0 Severity and Metrics:
Base Score: 7.8 HIGH
Vector: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v2.0 Severity and Metrics:
Base Score: 9.3 HIGH
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Affected software:
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Windows Server 2019
Solution:
We can use SanerNow platform to apply this critical vulnerability quickly across the organization as shown in the below diagrams.
NOTE: This vulnerability is been actively exploited by the attacker to break into the system, hence consider applying the solution immediately.
SanerNow: Vulnerability detection and patching of CVE-2019-0604:
1. Login to SanerNow platform
2. Switch to the account/site specific view and Go to 'VM tool'
3. CVE-2019-0604 vulnerability will be listed in 'Top Vulnerabilities' or 'Recently Discovered Vulnerabilities' as shown in the below diagram
4. Search for this vulnerability in VM tool. If you are affected, apply the patch through PM -> Missing Patches
5. Select 'Groups/Devices' in the 'Asset Source' section and click 'Apply'.
6. Select the appropriate patches from the 'Asset' section as shown in the below diagram. Please refer this Microsoft advisory for more information.
7. Select 'Apply Selected Patches' at the rightmost corner. This will prompt for 'Creating Patching Task'. Fill in 'Task Name' and 'Remediation Schedule' as per your preference and click on 'Apply Selected Patches' as shown below,
8. Remediation job will be created, which will fix the vulnerability by applying the patch.
9. Once remediation is done, the Saner agent automatically scans again and uploads the result.
Comments