• @[email protected]
    link
    fedilink
    615 days ago

    Wow, an article full of fear mongering with zero explanation of how it works.

    Not saying it isn’t a real concern, but how it works is crucial for understanding mitigation approaches.

    • @[email protected]
      link
      fedilink
      5
      edit-2
      15 days ago

      The full details of how it works will probably not be public yet in order to protect people who haven’t had a chance to patch yet

      It’s a zero user input, remote code execution exploit that doesn’t require direct physical access—that pretty much means anyone with WiFi is at risk until they patch

      • @[email protected]
        link
        fedilink
        215 days ago

        Agreed.

        The exploit was discovered by a security research firm who did the right thing and reported it to the SW creator, giving them the opportunity to distribute a patch.

        Since it hasn’t yet been reported as being exploited “in the wild” publishing details on how to perform the exploit would be at best negligent, and worst carelessly malicious.

    • @[email protected]
      link
      fedilink
      English
      315 days ago

      As someone else said there seems to be no public details. “Improper Input Validation” is about all the info given MSFT Source. It has also been reported a packet has to be sent, suggesting either being on same network or some kind of handshake issue (Source 1 Source 2). It is also said to evade conventional methods (like firewalls and canaries) so I have doubt you actually do need to be on the same network first. So If I had to guess there is some kind of issue with nearby share or wifi direct, since it affects sever versions also I can only assume something in the wifi direct implementation. Since input validation is mentioned and wifi direct can use pins, I would imagine there is some way to craft a special wifi direct packet that holds codes and windows just runs it and/or passes validation. I am just shooting in the dark but I don’t see mitigation short of disabling wi-fi or updating.