Microsoft Patches Two Privilege Escalation Flaws Exploited in Attacks

Microsoft’s Patch Tuesday updates for September 2019 fix 80 vulnerabilities, including two Windows flaws that have been exploited in attacks.


The zero-day vulnerabilities are CVE-2019-1214 and CVE-2019-1215. The first affects the Windows Common Log File System (CLFS) and it allows an authenticated attacker with regular user privileges to escalate permissions to administrator. The security hole was reported to Microsoft by a researcher from the Qihoo 360 Vulcan Team, but no details appear to have been released about the attacks exploiting the vulnerability.


It’s worth noting that while all supported versions of Windows appear to be affected by this weakness, Microsoft says exploitation is unlikely against the latest versions of the operating system.


Microsoft has not credited anyone for the second zero-day it patched on Tuesday. CVE-2019-1215 has been described by the company as a vulnerability in Winsock (ws2ifsl.sys) that allows a locally authenticated attacker to execute code with elevated privileges.


Unlike CVE-2019-1214, Microsoft lists the risk of exploitation as “more likely” in the case of CVE-2019-1215 for both older and newer versions of Windows.


“Interestingly, [ws2ifsl.sys] has been targeted by malware in the past, with some references going back as far as 2007. Not surprising, since malware often targets low-level Windows services,” experts at the Zero Day Initiative (ZDI) explained in a blog post.


Microsoft’s latest round o ..

Support the originator by clicking the read the rest link below.