First Vulnerability Found in Microsoft Edge, Affects Other Software as Well

Status
Not open for further replies.

vindiesel

Level 7
Thread author
Verified
Apr 15, 2013
333
Internet Explorer, Windows Media Player, Excel, QuickTime, AVG, BitDefender, and Comodo Antivirus also vulnerable
At the Black Hat USA 2015 conference in Las Vegas, a team of security experts led by Jonathan Brossard have presented a vulnerability in the Microsoft Server Message Block (SMB) protocol used for sharing files in local networks.

The vulnerability affects all version of Windows, including the newer Windows 10, and can be exploited via the Internet, something researchers thought as impossible.

SMB is a 21-years-old protocol created by IBM, which allows for sharing files and printers inside a network. Since its creation, it has evolved and reached version 3.0, which now ships with most Windows OS instances.

The protocol is used most of the times in enterprise networks, working together with the NTLMv2 authentication algorithm, which allows users to quickly authenticate themselves on Windows servers.

A faulty DLL is at the core of the problem
The vulnerability discovered by Mr. Brossard's team allows hackers to extract user credentials from a closed Windows domain using an attack technique called SMB relay (a basic man-in-the-middle for SMB data).

While this technique usually worked only in LANs, because most enterprise networks have now expanded to include cloud infrastructures, an SMB relay can now be performed for Internet-facing connections as well.

The credentials leak happens when a user is trying to read an email, access a Web page using their browser or do anything that implies opening a URL.

This opens a specific DLL file put into place to protect against SMB relay attacks, but its content and subsequent settings are ignored, as the security experts have found out.

This allows an attacker to perform an SMB relay attack, get the user's credentials, break the password hash, and then use them to steal information from the network by passing as a regular user.

This is the first vulnerability ever reported to affect the Edge browser
As Mr. Brossard notes, all IE versions are vulnerable, including Microsoft's latest Edge browser, making this "the first attack against Windows 10 and its web browser Spartan."

Additionally, other vulnerable applications include Windows Media Player, Adobe Reader, Apple QuickTime, Excel 2010, Symantec's Norton Security Scan, AVG Free, BitDefender Free, Comodo Antivirus, IntelliJ IDEA, Box Sync, GitHub for Windows, TeamViewer, and many other more.

The research paper was written before the Windows 10 launch, and obviously before Spartan was renamed to Edge.

The research also includes different mitigation techniques, but according to Mr. Brossard, the most efficient one would be to set up custom PC-level Windows Firewall settings, preventing SMB data from leaking online via specific ports, where an SMB relay can be carried out.

"Since virtually any Windows machine part of a corporate network uses IE as a default web browser and is typically part of an Active Directory network, the magnitude of this vulnerability is unprecedented," says Mr. Brossard.
 

vivid

Level 5
Verified
Dec 8, 2014
206
A similar vulnerability can be achieved anyway.
Important points :
1) Security products use plain HTTP ;
2) Not everything is digitally signed.
 

McLovin

Level 76
Verified
Honorary Member
Malware Hunter
Apr 17, 2011
9,224
ymxMWdv.jpg
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
There will be more Vulnerabilitys soon enough :)

Users of Windows 10 should not be discouraged by this report. Microsoft knows all too well with it's predecessor; Internet Explorer and should be more than up to the job, to quickly resolve these vulnerabilities. And many that arise in the future of Edge.

Security Updates are delivered automatically and installed via Windows Update, in Windows 10.
 

Rolo

Level 18
Verified
Jun 14, 2015
857
Users of Windows 10 should not be discouraged by this report
Especially since there is no vulnerability unless one specifically opens this stuff up, which one wouldn't do:
  • SMB-Out is already blocked in WAF default configuration for Domain and Public networks
  • "Internet-facing" boxes would already be in a DMZ and locked down anyway
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
That's normal for such trend, vulnerabilities are just viruses where the flow of infection are not yet emerged.

But when its totally widespread, the time its recognize for a cure. (It can be vice versa)

Thing you should surprise a little bit are other old school vulnerabilities that are likely never been patched which makes it pose security risk immediately at the high level.
 

vivid

Level 5
Verified
Dec 8, 2014
206
Especially since there is no vulnerability unless one specifically opens this stuff up

Not true, sadly. If you're in a LAN then you're very vulnerable to such attacks (eg MITM).
 

Rolo

Level 18
Verified
Jun 14, 2015
857
Not true, sadly. If you're in a LAN then you're very vulnerable to such attacks (eg MITM).
Everything is vulnerable to an attacker on your physical network, which isn't what this article is talking about and hence, not what I was referring to.
 

vivid

Level 5
Verified
Dec 8, 2014
206
Everything is vulnerable to an attacker on your physical network, which isn't what this article is talking about and hence, not what I was referring to.
MITM is possible over Internet... The article is about MITM. I was only saying that the actual problem lies in update method of products-- by not utilizing digitally signed files and proper hash algorithm.

Proof of Concept :

 

Rolo

Level 18
Verified
Jun 14, 2015
857
I didn't say MITM wasn't; I was referring to the vulnerability in the OP article.

Everything is vulnerable to social engineering/physical access, so to blame a particular product alone is faulty logic. Of course, a vulnerability that is unlikely to lead to an actual exploit doesn't garner clicks like a headline implying Edge will open your entire domain up to the Internet if you click on a link will.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top