Microsoft Patches IE Zero-Day Bug (Nov 13, 2019)
A fix has been released by Microsoft for a zero-day flaw found in Internet Explorer. According to Microsoft’s vulnerability assessment, “CVE-2019-1429” could be exploited by a malicious actor to remotely gain administrative user rights and take control of an affected system. The actor could then create new accounts and install programs, as well as view, change, and delete data. The vulnerability exists in how the scripting engine handles objects in memory in the browser. Microsoft also released 74 additional fixes for vulnerabilities during the November patch update round, including vulnerabilities in Excel, Adobe, and Trusted Platform Module chipset firmware.
Recommendation: Vulnerabilities located in Internet Explorer (IE) are seemingly found on a regular basis. Therefore, it would be prudent for you organization to prohibit the use of IE to avoid potential malicious activity. The default browser should be changed from IE to something else to avoid possible exploitation of this vulnerability, and IE could be uninstalled completely if it is unneeded. If IE is necessary, patches should be reviewed and applied as soon as possible to prevent potential malicious activity.
Indicators of Compromise (IOCs) associated with this story can be viewed by ThreatStream users here to identify potential malicious activity.