• Windows security hole allows attackers to install malware via Wi-Fi

    Home » Forums » Cyber Security Information and Advisories » Code Red – Security/Privacy advisories » Windows security hole allows attackers to install malware via Wi-Fi

    Author
    Topic
    #2680696

    The vulnerability affects all modern versions of Windows and Windows Server.

    https://www.tomshardware.com/software/windows/windows-security-hole-allows-attackers-to-install-malware-via-wi-fi-new-patch-plugs-gaping-vulnerability

    [Moderator edit] moved to new forum

    8 users thanked author for this post.
    Viewing 3 reply threads
    Author
    Replies
    • #2680780

      Microsoft acknowledges there were no known active exploits

      Microsoft considers exploitation of the vulnerability “less likely,”

      The patch eliminating the security vulnerability was released on June 11.

      1 user thanked author for this post.
    • #2680823

      The vulnerability affects all modern versions of Windows and Windows Server.

      https://www.tomshardware.com/software/windows/windows-security-hole-allows-attackers-to-install-malware-via-wi-fi-new-patch-plugs-gaping-vulnerability

      [Moderator edit] moved to new forum

      Shalom,
      What is Ask Woody’s recommendation? Is this an exempt from Defcon 2?
      thanks,
      laksi

      • #2680855

        No. Master Patch List says Defer for June’s Cumulative Updates.

        1 user thanked author for this post.
      • #2680858
        1 user thanked author for this post.
      • #2680983

        Stay tuned Monday morning for my official take.

        I’ll give a hint.  Do you connect to wifi in a coffee shop?  Then you should worry.  (you should worry in general doing it).  Do you connect to your OWN wifi?  Attackers have to be on the SAME network before they can attack you.

        So unless you don’t trust your wife or your husband, you are fine.

        Susan Bradley Patch Lady/Prudent patcher

        3 users thanked author for this post.
        • #2681040

          Or your kids!

          cheers, Paul

          2 users thanked author for this post.
        • #2683004

          Susan, do you expect to publish something today on this?

          Thanks as always,

          Steve

        • #2683058

          Attackers have to be on the SAME network before they can attack you.

          That seems an unlikely prerequisite from the descriptions:

          Obviously, the target would need to be in Wi-Fi range of the attacker and using a Wi-Fi adapter, but that’s the only restriction.

          https://www.zerodayinitiative.com/blog/2024/6/11/the-june-2024-security-update-review

          When the victim’s computer scans Wi-Fi networks and encounters the attacker’s SSID, the code is remotely executed on the victim’s system.

          https://www.cve.news/cve-2024-30078/

          1 user thanked author for this post.
          • #2683098

            Attackers have to be on the SAME network before they can attack you.

            That seems an unlikely prerequisite

            It seems an absolute prerequisite in my experience. “2. Avoid connecting to suspicious networks: As tempting as it may be to join open networks, avoid them if you’re unfamiliar with the source.”

            My laptop is connected to my home network via WiFi.  Being connected, it is not scanning for WiFi signals; it’s already connected.  I would literally have to uncheck “Connect automatically” from my network credentials, then disconnect from my home network before my laptop would even try to scan for WiFi signals.

            In order for the exploit to work, I would have to connect to the bogus SSID, and join that network in order for anything else in this exploit to continue.  There are half a dozen SSID’s being broadcast in my neighborhood constantly, but my laptop is already connected to my home network, and not trying to connect to another.

            Always create a fresh drive image before making system changes/Windows updates; you may need to start over!
            We all have our own reasons for doing the things that we do with our systems; we don't need anyone's approval, and we don't all have to do the same things.
            We were all once "Average Users".

            • #2683134

              In order for the exploit to work, I would have to connect to the bogus SSID, and join that network in order for anything else in this exploit to continue.

              You would not have to connect to that network:

              When the victim’s computer scans Wi-Fi networks and encounters the attacker’s SSID, the code is remotely executed on the victim’s system.

              https://www.cve.news/cve-2024-30078/

              1 user thanked author for this post.
            • #2683146

              In the original MSRC write up they have “An unauthenticated attacker could send a malicious networking packet to an adjacent system that is employing a Wi-Fi networking adapter, which could enable remote code execution.”

              The CVENews site is “CVE.news is an independent publication launched in August 2022 by IVAN NOVIKOV” and is the only place I’ve seen leap from merely scanning for wifi access points will trigger this attack.

              I’m not reading anywhere that this can occur without connecting to the network.  Got another source because Ivan is the only one saying that as I can see?

              Susan Bradley Patch Lady/Prudent patcher

              2 users thanked author for this post.
            • #2683180

              MSRC also indicates that no user interaction with a malicious SSID is needed.

              Don’t you trust “Wi-Fi range … the only restriction” at Zero Day Initiative?

              Microsoft has confirmed that with no special access conditions or extenuating circumstances needed, apart from the proximity requirement, an attacker could “expect repeatable success against the vulnerable component.” Microsoft also warns that an attacker requires no authentication as a user before exploiting this vulnerability, nor any access to settings or files on the victim’s machine before carrying out the attack. Furthermore, the user of the targeted device does not need to interact at all: there is no link to click, no image to load, and no file to execute.

              CVE-2024-30078 Can Be Exploited Without Any User Interaction [Davey Winder at Forbes]

              Exploits are available, with some details of how it works [at various locations on the Web]

              Moderator’s Note: Link to explanation removed due to linking to exploit code.

              1 user thanked author for this post.
            • #2683193

              Where exactly does MSRC say that?

              https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30078

               

              Also:

              https://x.com/f4rmpoet/status/1805335876798390283

              I need to make a correction. Upon closer inspection it seems you need to be authenticated on the same network as the victim. I wonder if

              are planning a talk or blogpost on this vulnerability.”

               

              Susan Bradley Patch Lady/Prudent patcher

            • #2683292

              Where exactly does MSRC say that?

              https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30078

              > User Interaction > None

              “The vulnerable system can be exploited without any interaction from any user.”

            • #2683343
              That doesn’t say anything about merely scanning for a SSID.
              I need to make a correction. Upon closer inspection it seems you need to be authenticated on the same network as the victim. I wonder if

              are planning a talk or blogpost on this vulnerability.

              1
              5

              Susan Bradley

              Post your reply
              Reply
              Probable spam

              Blkph0x
              @Blkph0x2
              I found the same thing. testing i found the code path is executed on joining a network, hit multiple times during authentication so im going down the path now of setting up an open wifi AP that will send the frames, if an open network is auto join this could be zero click. maybe
              11

              Susan Bradley Patch Lady/Prudent patcher

            • #2683396

              That doesn’t say anything about merely scanning for a SSID.

              That’s not what you asked.

              But the exploits employ a malicious SSID.

            • #2683398

              B honey, dear let me remind you of the conversation:

              You are arguing now for arguing sake and this thread will be closed shortly if you continue to be ridiculous.

              =========

              In order for the exploit to work, I would have to connect to the bogus SSID, and join that network in order for anything else in this exploit to continue.

              You then said:  You would not have to connect to that network:

              And then linked to this

              When the victim’s computer scans Wi-Fi networks and encounters the attacker’s SSID, the code is remotely executed on the victim’s system.

              https://www.cve.news/cve-2024-30078/

              Then you said and pointed to Forbes:

              “MSRC also indicates that no user interaction with a malicious SSID is needed.

              Don’t you trust “Wi-Fi range … the only restriction” at Zero Day Initiative?

              Microsoft has confirmed that with no special access conditions or extenuating circumstances needed, apart from the proximity requirement, an attacker could “expect repeatable success against the vulnerable component.” Microsoft also warns that an attacker requires no authentication as a user before exploiting this vulnerability, nor any access to settings or files on the victim’s machine before carrying out the attack. Furthermore, the user of the targeted device does not need to interact at all: there is no link to click, no image to load, and no file to execute.

              CVE-2024-30078 Can Be Exploited Without Any User Interaction [Davey Winder at Forbes]

              What Davey left out was “user has to connect to unknown wifi”.  Which is a huge mitigation.  If it’s an open wifi with no security – honey I never connect to that.  If it’s a wifi with a security lock and it’s not one that I’ve personally set up, know who set it up I am seriously questioning should I connect to that and the potential for someone to have malicious code on that network.  Like for example anyone travelling to Blackhat should wipe their computer before going and then once they get back as the Blackhat/Defcon gang are notorious for historical hacks and cracks.  But John Q Askwoody reader connecting to their own wifi has nothing to fear.

              Susan Bradley Patch Lady/Prudent patcher

              3 users thanked author for this post.
            • #2683425

              B honey, dear let me remind you of the conversation:

              You are arguing now for arguing sake and this thread will be closed shortly if you continue to be ridiculous.

              All I did today is answer your questions to help clarify the situation.

              CVE-2024-30078 Can Be Exploited Without Any User Interaction [Davey Winder at Forbes]

              What Davey left out was “user has to connect to unknown wifi”.

              Perhaps because it’s not true?

              Why would Microsoft say no user interaction is needed if that were the case?

              And especially, why would its explanation of “Attack vector: Adjacent” only say “within proximity”?:

              FAQ

              According to the CVSS metric, the attack vector is adjacent. What does that mean for this vulnerability?

              Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions.

              But John Q Askwoody reader connecting to their own wifi has nothing to fear.

              Perhaps we’ll find out for sure soon. Steve Gibson of GRC.com thinks it’s high severity, and he doesn’t stipulate any network connection:

              Security News
              CVE-2024-30078

              I need to begin this week by making 100% certain that everyone listening is aware of a flaw that was patched during last Tuesday’s Windows patchfest. It’s CVE-2024-30078 and the only reason it only has a CVSS score of 8.8, rather than 11 on a scale that maxes out at 10, is that an attacker needs to be within WiFi radio range of the Windows machine – any Windows machine with WiFi enabled that has not been updated with last Tuesday’s patches – in order to obtain total control over that machine.

              https://www.grc.com/sn/sn-979-notes.pdf

            • #2683435

              If this was truly what you say we’d see reports of attacks by now.

              Give it up b.  You have to connect to the access point and be on the same wifi.

              Microsoft notoriously has lousy vulnerability documentation these days partly to ensure they don’t give pointers to the attackers and partially because they’ve cut perssonnel.

              At no place in their documentation do they say you merely have to be there.  What they are referring to is once you’ve connected to wifi AND the person is on the same network THEN there is no action needed and no firewall protects you (and no vpn either for that matter).  You won’t need to click on a file or a popup or an email. once you and the attacker share the same subnet then they can throw a malicious packet at you.  If you are not connected to their wifi, you can’t.

              For the benefit of the Askwoody readership, please understand this vulnerability.  It is not what you keep trying to say it is.

              You must connect to the malicious wifi first.

              Susan Bradley Patch Lady/Prudent patcher

              4 users thanked author for this post.
            • #2683436

              P.S. Steve Gibson wrote that a week or so ago.  My guess if I showed him the various githubs and information on the web today, he wouldn’t say what he said.

              Security guidance changes as we understand the vulnerability more.  Microsoft is not clear with their documentation these days at all.

              Susan Bradley Patch Lady/Prudent patcher

              2 users thanked author for this post.
            • #2683777

              P.S. Steve Gibson wrote that a week or so ago. My guess if I showed him the various githubs and information on the web today, he wouldn’t say what he said.

              He said a lot more about it two days ago, and now thinks it’s more dangerous than before, not less:

              Ok, so we have this guy publicly working on a public exploit for this very worrisome flaw and we’re about to see why it turns out, this is a lot worse than it first seemed.

              SECURITY NOW 980 TRANSCRIPT — Jun 25th 2024

            • #2683819

              He said a lot more about it two days ago, and now thinks it’s more dangerous than before, not less:

              For me, it will have to reconfigure my laptop to support two WiFi connections simultaneously in order to be effective.  My laptop supports only one network connection at a time, and it’s already connected.

              It’s like being attacked by a shark.  I’m many miles away from salt water, and I’m not concerned in the least about a shark attack.

              Always create a fresh drive image before making system changes/Windows updates; you may need to start over!
              We all have our own reasons for doing the things that we do with our systems; we don't need anyone's approval, and we don't all have to do the same things.
              We were all once "Average Users".

            • #2683903

              For me, it will have to reconfigure my laptop to support two WiFi connections simultaneously in order to be effective.

              You installed KB5039212 weeks ago so it need not concern you anyway.

            • #2683905

              What concerns me most is various pundits on the web like Mr. Gibson that are overreacting to this vulnerability.  It’s not wormable.  I don’t like it when the security industry spins and clickbaits security information and misinforms.  That is what is going on here.

              At this point in time I urge any of the readership to install the June updates that were released on June 11, but don’t freak out and not connect to the Internet if you have not. This vulnerability is only a risk if the attacker is on the same network that you are.  Merely connecting to a known wifi like that of your house will not be enough to trigger this vulnerability.

              Do not install any preview updates that may have downloaded to your machine. Microsoft has pulled the June 25th update due to issues triggering reboots.

              We will be getting ready for July’s updates next week.

              Susan Bradley Patch Lady/Prudent patcher

              3 users thanked author for this post.
            • #2683855

              All that is showcasing is that he’s not understanding the vulnerability. You have to connect to the SSID and be on the same subnet as the attacker.

              https://xz.aliyun.com/t/14941?time__1311=mqmxyD0iDtD%3DKAKDsYoYKw1nD9GKrDu76YD

              Translated …

              Take advantage of the scene

              1. The attacker acts as an AP to induce the victim to connect to the WiFi and then launches an attack
                Note: There is no situation where a user is attacked just by turning on the WiFi
              2. The attacker and victim connect to the same WiFi and then attack”

              Get it now?  You have to connect.  Merely having your machine running and scanning for SSIDs is not enough.  You then connect to the SAME wifi as the attacker.

              With all due respect to Mr. Gibson this is not a wormable 10.  It’s a “I have to be stupid and jump in shark infested waters”.  It’s not a “I merely have to stand on the beach and look at the shark to be attacked”.

              Understand the nuance here?

              Susan Bradley Patch Lady/Prudent patcher

              8 users thanked author for this post.
            • #2683200

              One of the POC’s authors now indicate he’s not got the right bug.

              “#INFO : This REPO does not seem to be hitting the same bug as in the stated CVE new information has came to my attention thaks to FarmPoet, The CVE-2024-30078 vulnerability is in Dot11Translate80211ToEthernetNdisPacket() of the native wifi windows driver (nwifi.sys) and a very specific frame needs to be constructed to even get to the vulnerable code path (which this code does not).”

              FarmPoet also indicated that the other POC he’s seen wasn’t hitting the same bug.

              Susan Bradley Patch Lady/Prudent patcher

            • #2683290

              One of the POC’s authors now indicate he’s not got the right bug.

              “#INFO : This REPO does not seem to be hitting the same bug as in the stated CVE new information has came to my attention thaks to FarmPoet, The CVE-2024-30078 vulnerability is in Dot11Translate80211ToEthernetNdisPacket() of the native wifi windows driver (nwifi.sys) and a very specific frame needs to be constructed to even get to the vulnerable code path (which this code does not).”

              That was a previous version which was linked at the top of the link I provided (“forked from …).

            • #2683344

              Which just occurred recently and is still only triggered after joining the network.

              The user interaction none — if taken at face value would even exclude scanning for a SSID.  They mean that once you are connected to same network as the attacker, that then you don’t have to take actions to be potentially attacked.  As long as the malicious attacker and you are on the same wifi, then they can fling packets at you.

              Don’t connect to a wifi you don’t know.  But scanning for SSIDs isn’t enough to trigger the exploit.

              And running a VPN won’t help.

              Susan Bradley Patch Lady/Prudent patcher

            • #2683186

              You would not have to connect to that network

              My laptop would have to be susceptible, “have its ears on”.  It is already connected to my home network.  It is not listening to SSID broadcasts; it is listening to my WiFi router in order to maintain that stable network connection.

              My laptop cannot “hear” other SSID’s without me first disconnecting from my home network.  Only then does it listen for SSID’s.

              Always create a fresh drive image before making system changes/Windows updates; you may need to start over!
              We all have our own reasons for doing the things that we do with our systems; we don't need anyone's approval, and we don't all have to do the same things.
              We were all once "Average Users".

            • #2683245

              My laptop cannot “hear” other SSID’s without me first disconnecting from my home network.  Only then does it listen for SSID’s.

              Not true. Click on the wifi connection in the tray and you will see all the local wifi networks, without having to disconnect from your current connection.
              When you fire the machine up it listens for all networks and then connects to the one you have specified, if it’s available.

              cheers, Paul

              1 user thanked author for this post.
            • #2683360

              Not true. Click on the wifi connection in the tray and you will see all the local wifi networks, without having to disconnect from your current connection.

              Clearly, I’m doing a really poor job of explanation.

              When you fire the machine up it listens for all networks and then connects to the one you have specified, if it’s available.

              It never gets shutdown, merely signed off; I’ll try to explain once more.  When my laptop is connected to my home network, it receives/sends packets only from the connected network.  It is not going to receive packets from any other WiFi network.

              When I plug in an Ethernet cable, my WiFi is automatically turned off.  My laptop can only support one connection at a time.  The only time it would be vulnerable is when it is not actively connected via WiFi or Ethernet.  Connected to my home network via WiFi, it can only support (send/receive packets) that single connection.

              Always create a fresh drive image before making system changes/Windows updates; you may need to start over!
              We all have our own reasons for doing the things that we do with our systems; we don't need anyone's approval, and we don't all have to do the same things.
              We were all once "Average Users".

              1 user thanked author for this post.
            • #2683379

              But in this case you have to connect to the same wifi network as the attacker.  So if you don’t trust that wifi, haven’t set it up personally, don’t connect to it.

              If you do connect to untrusted wifi perhaps you need to review the risk of doing that in the first place?

              Susan Bradley Patch Lady/Prudent patcher

              5 users thanked author for this post.
    • #2683834

      I’m many miles away from salt water, and I’m not concerned in the least about a shark attack.

      There are sharks in fresh waters lakes and rivers.

      • #2683842

        There are sharks in fresh waters

        Asia and Australia.  I’m in south central Florida.

        The bull shark (Carcharhinus leucas), also known as the Zambezi shark (informally zambi) in Africa and Lake Nicaragua shark in Nicaragua, is a species of requiem shark commonly found worldwide in warm, shallow waters along coasts and in rivers. It is known for its aggressive nature, and presence mainly in warm, shallow brackish and freshwater systems including estuaries and (usually) lower reaches of rivers.”  I live near Peace River, but many, many, many ‘river’ miles from the “lower reaches” of the river.

        And, I’m not in the river.  But I still have a higher risk of shark attack than of having my laptop reconfigured remotely to support two WiFi connections simultaneously.

        Always create a fresh drive image before making system changes/Windows updates; you may need to start over!
        We all have our own reasons for doing the things that we do with our systems; we don't need anyone's approval, and we don't all have to do the same things.
        We were all once "Average Users".

        1 user thanked author for this post.
    • #2683852

      Asia and Australia.  I’m in south central Florida

      You have freshwater crocodiles 🙂

      I don’t know which is worse.

    Viewing 3 reply threads
    Reply To: Windows security hole allows attackers to install malware via Wi-Fi

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: