Microsoft won't fix 'Dogwalk' zero-day from 2020

By

Microsoft Diagnostics Tools bug re-awakens.

Microsoft is declining to patch a two-year-old directory traversal vulnerability in all versions of Windows that researchers have labelled a zero-day.

Microsoft won't fix 'Dogwalk' zero-day from 2020

The bug was originally reported to Microsoft in January 2020 by security researcher Imre Rad, and like the recently discovered "Follina" vulnerability it involves attackers abusing Microsoft diagnostic tools to execute malicious code.

Rad found that a flaw in how cabinet (*.cab) files are verified allows attackers to save the file archives to any location on Windows computers.

By saving a diagcab file to the Startup folder in Windows, attackers can the run their code the next time a user logs in.

Security researcher j00sean rediscovered the vulnerability earlier this month, and noted that it bypasses not only Microsoft Defender, but also browser-based file downloader warnings to users.

Named "Dogwalk" by security researchers, the vulnerability also gets past Microsoft's Mark of the Web (MOTW) security attributes for files that warn users before opening them.

The Spanish security researcher also reported the flaw to Microsoft's security team, but was told the bug doesn't warrant fixing.

Security vendor 0patch has released free micropatches for Dogwalk that adds the missing security check, without a Windows reboot required.

At this stage, it is not known if the Dogwalk zero-day has been actively exploited by attackers.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

"Widespread data theft" hits Salesforce customers via third party

"Widespread data theft" hits Salesforce customers via third party

Home Affairs adds SecOps to new cyber risk overhaul

Home Affairs adds SecOps to new cyber risk overhaul

Exetel fined $694k over system 'vulnerability' for mobile number porting

Exetel fined $694k over system 'vulnerability' for mobile number porting

Attackers weaponise Linux file names as malware vectors

Attackers weaponise Linux file names as malware vectors

Log In

  |  Forgot your password?