Internet Explorer Zero-day Vulnerability
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
When a user opens the document, a malicious webpage is opened in the background which delivers the malware from a Command and Control (C2) server. When successfully exploited, the attack uses a publicly known User Account Control (UAC) bypass, reflective DLL loading (loading a DLL from memory rather than from disk), fileless execution, and steganography. By bypassing UAC, the attack escalates privileges on the user’s device.
Remediation steps
| Type | Step |
|---|---|
|
At the time of publication there is no available update to rectify this vulnerability.
|
Last edited: 17 February 2020 12:45 pm