Thursday, January 23, 2025
HomeCyber Security NewsWindows Server 2012 0-day Vulnerability Exposes Critical Security Flaw

Windows Server 2012 0-day Vulnerability Exposes Critical Security Flaw

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers have identified a critical 0-day vulnerability in Windows Server 2012 and Server 2012 R2.

This previously unknown security flaw allows attackers to bypass the Mark of the Web (MoTW) verification on certain files, posing a significant threat to affected systems.

Vulnerability Details

The vulnerability, which was introduced over two years ago, has managed to evade detection despite the high level of scrutiny applied to Windows Server systems.

Even servers that have been fully updated with Extended Security Updates are vulnerable. This discovery underscores the persistent challenges in maintaining security in older software systems.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

The researchers, who are holding back detailed information to prevent potential exploitation, have already notified Microsoft, as a report by 0Patch. They are awaiting an official fix from the tech giant, which could take time given the complexity of the issue.

In response to this critical security gap, the researchers have promptly issued micropatches.

These temporary fixes are being provided free of charge until Microsoft releases an official update. The micro patches cover the following configurations:

  • Legacy Windows Versions:
    • Windows Server 2012 updated to October 2023
    • Windows Server 2012 R2 updated to October 2023
  • Windows Versions Still Receiving Windows Updates:
    • Windows Server 2012 with Extended Security Updates
    • Windows Server 2012 R2 with Extended Security Updates

These patches have been seamlessly distributed to all affected computers with the 0patch Agent in PRO or Enterprise accounts.

Users can apply these micropatches without needing to reboot their systems, ensuring minimal disruption to operations.

The discovery of this vulnerability highlights the ongoing risk associated with unsupported Windows versions. Vulnerabilities are routinely identified and can be exploited by attackers aware of these security lapses.  

This proactive approach is crucial in maintaining security while awaiting a more permanent solution from Microsoft.

It emphasizes the importance of layered security strategies and the role of third-party solutions in closing gaps left by official updates.

Analyse Advanced Malware & Phishing Analysis With ANY.RUN Black Friday Deals : Get up to 3 Free Licenses.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular...

New Cookie Sandwich Technique Allows Stealing of HttpOnly Cookies

The "Cookie Sandwich Attack" showcases a sophisticated way of exploiting inconsistencies in cookie parsing...

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Critical Vulnerability in Next.js Framework Exposes Websites to Cache Poisoning and XSS Attacks

A new report has put the spotlight on potential security vulnerabilities within the popular...

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Tycoon 2FA Phishing Kit Using Specially Crafted Code to Evade Detection

The rapid evolution of Phishing-as-a-Service (PhaaS) platforms is reshaping the threat landscape, enabling attackers...