What is a Zero-day Vulnerability?
A zero-day vulnerability is like a hidden door in a computer program that hackers find before anyone else knows about it and is often times in the program when it ships to customers, unknown to the publishers. Since nobody knows about it, there are zero days to fix it before hackers can exploit it
What is Sandworm?
CVE-2014-4114 (aka “Sandworm”): A zero-day vulnerability that allows an attacker to remotely execute arbitrary code.
Who is vulnerable?
Sandworm is a zero-day impacting all versions of Microsoft Windows from Vista SP2 up to Windows 8.1, as well as Windows Server 2008 and 2012.
Where has it been seen?
Used in Russian cyber-espionage campaign targeting NATO, European Union (like Ukraine), Telecommunications and Energy sectors.
How does it work?
Non-technical: opening a specially crafted file will allow the remote code execution. This has been seen with Powerpoint files in the wild.
Technical:
“The vulnerability exists because Windows allows the OLE packager (packager .dll) to download and execute INF files. In the case of the observed exploit, specifically when handling Microsoft PowerPoint files, the packagers allows a Package OLE object to reference arbitrary external files, such as INF files, from untrusted sources. This will cause the referenced files to be downloaded in the case of INF files, to be executed with specific commands.”
[source: isightpartners.com]
Additional Notes:
Microsoft classified MS14-060 as “important”, not “critical”, because the attack requires a user to open a file.
Security Operations Center Recommendations:
Update all vulnerable systems as soon as possible. Microsoft Bulletin MS14-060 fixes this bug here.
Additionally, Microsoft has released a total of eight security bulletins and updates that address them as of October 14, 2014. In total, 24 vulnerabilities are addressed in the updates. Three of them are classified as critical. More information can be found here.