3 weeks ago
27 Views

(Unpatched) Adobe Flash Player Zero-Day Exploit Spotted inside Wild

flash-zero-dy-exploit

Another reason to uninstall Adobe Flash Player—a brand-new zero-day Flash Player exploit has reportedly been spotted inside wild by North Korean hackers.

South Korea’s Computer Emergency Response Team (KR-CERT) issued an alert Wednesday for a brand-new Flash Player zero-day vulnerability in which’s being actively exploited inside wild by North Korean hackers to target Windows users in South Korea.

Simon Choi of South Korea-based cybersecurity firm Hauri first reported the campaign on Twitter, saying the North Korean hackers have been using the Flash zero-day against South Koreans since mid-November 2017.

Although Choi did not share any malware sample or details about the vulnerability, the researcher said the attacks using the brand-new Flash zero-day is usually aimed at South Korean individuals who focus on researching North Korea.

Adobe also released an advisory on Wednesday, which said the zero-day is usually exploiting a critical ‘use-after-free’ vulnerability (CVE-2018-4878) in its Flash media software in which leads to remote code execution.

flash-zero-dy-exploit

The critical vulnerability affects Adobe Flash Player type 28.0.0.137 in addition to earlier versions for:

  • Desktop Runtime (Win/Mac/Linux)
  • Google Chrome (Win/Mac/Linux/Chrome OS)
  • Microsoft Edge in addition to Internet Explorer 11 (Win 10 & 8.1)

“Adobe is usually aware of a report in which an exploit for CVE-2018-4878 exists inside wild, in addition to is usually being used in limited, targeted attacks against Windows users,” the advisory said. “These attacks leverage Office documents with embedded malicious Flash content distributed via email. Adobe will address in which vulnerability in a Discharge planned for the week of February 5.


To exploit the vulnerability, all an attacker need to do is usually trick victims into opening Microsoft Office documents, web pages, or spam messages in which contain a maliciously crafted Adobe Flash file.

The vulnerability can be leveraged by hackers to take control of an affected computer.

Choi also posted a screenshot to show in which the Flash Player zero-day exploit has been delivered via malicious Microsoft Excel files.

Adobe said in its advisory in which the company has planned to address in which vulnerability in a “Discharge planned for the week of February 5,” through KR-CERT advises users to disable or completely remove the buggy software.

Article Categories:
Security Hacks

Leave a Comment

Your email address will not be published. Required fields are marked *

16 + 4 =