Why Is Cloud Security So Hard? (Hint: It’s Not)
Securing a new environment without knowing the rules of the road can be hard. Take the time to learn the rules and avoid speedbumps.
There is a vulnerability affecting all versions of Windows with no available patch from Microsoft, but have several workarounds.
This was an email I sent to my vCISO/CISO As A Service clients this morning. Since they do not have their own CISOs or security teams, they would not have found out about this for a while. They do have strong IT teams, though, so I provided instructions and actions they can take internally.
There is a vulnerability affecting all versions of Windows with no available patch from Microsoft. Additionally, there have been active exploits seen in the wild; however, they are currently targeted. This, of course, can change and become widespread. The exploit happens when a user opens a malicious document.
Please let me know if you have any questions or concerns.
vCISO & Security Advisor
Cloud Security Labs
Disabling the Preview and Details panes in Windows Explorer prevents the automatic display of OTF fonts in Windows Explorer. While this prevents malicious files from being viewed in Windows Explorer, it does not prevent a local, authenticated user from running a specially crafted program to exploit this vulnerability. To disable these panes in Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows 8.1, perform the following steps:
For Windows Server 2016, Windows 10, and Windows Server 2019, perform the following steps:
Windows Explorer will not automatically display OTF fonts.
To re-enable the Preview and Details panes in Windows Explorer for Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows 8.1:
For Windows Server 2016, Windows 10, and Windows Server 2019:
Disabling the WebClient service helps protect affected systems from attempts to exploit this vulnerability by blocking the most likely remote attack vector through the Web Distributed Authoring and Versioning (WebDAV) client service. After applying this workaround, it is still possible for remote attackers who successfully exploit this vulnerability to cause the system to run programs located on the targeted user’s computer or the Local Area Network (LAN), but users will be prompted for confirmation before opening arbitrary programs from the Internet.
To disable the WebClient Service, perform the following steps:
When the WebClient service is disabled, Web Distributed Authoring and Versioning (WebDAV) requests are not transmitted. In addition, any services that explicitly depend on the WebClient service will not start, and an error message will be logged in the System log. For example, WebDAV shares will be inaccessible from the client computer.
To re-enable the WebClient Service, perform the following steps:
If this article was helpful to you, consider subscribing to my weekly newsletter, where I share my latest commentary as a vCISO for high growth startups.
Check out how we help startups accelerate and level up their security programs through vCISO (CISO As A Service).