Wednesday, March 13, 2013

ATTN:Microsoft releases patch to fix Windows USB hack!

Microsoft has announced a security patch that will help to protect users from a new vulnerability where hackers can steal data and passwords using USB drive disk even while the computer system is locked.  Hackers can use USB stick to acquire data and passwords from a user's computer even while the 'CTRL+ALT+DEL' lock screen is on. A statement released from the Microsoft blog -https://blogs.technet.com/b/srd/archive/2013/03/12/ms13-027-addressing-an-issue-in-the-usb-driver-requiring-physical-access.aspx?Redirected=true (read below) shows how an attacker can use a simple USB drive to steal data.
"Today we are addressing a vulnerability in the way that the Windows USB drivers handle USB descriptors when enumerating devices. (KB 2807986). This update represents an expansion of our risk assessment methodology to recognize vulnerabilities that may require physical access, but do not require a valid logon session. Windows typically discovers USB devices when they are inserted or when they change power sources (if they switch from plugged-in power to being powered off of the USB connection itself). To exploit the vulnerability addressed by MS13-027, an attacker could add a maliciously formatted USB device to the system. When the Windows USB device drivers enumerate the device, parsing a specially crafted descriptor, the attacker could cause the system to execute malicious code in the context of the Windows kernel.
Because the vulnerability is triggered during device enumeration, no user intervention is required. In fact, the vulnerability can be triggered when the workstation is locked or when no user is logged in, making this an un-authenticated elevation of privilege for an attacker with casual physical access to the machine. Other software that enables low-level pass-through of USB device enumeration may open additional avenues of exploitation that do not require direct physical access to the system".

No comments:

Post a Comment