The vulnerability identified as CVE-2023-28252 is a privilege escalation flaw affecting the Windows Common Log File System driver. Credit: Elnur/Shutterstock Microsoft has released a patch for a Windows zero day vulnerability that has been exploited by cybercriminals in ransomware attacks. The vulnerability, identified as CVE-2023-28252, is a privilege escalation flaw affecting the Windows Common Log File System (CLFS) driver.CLFS is a general purpose logging service that can be used by dedicated client applications and that multiple clients can share to optimize log access. The vulnerability allows an attacker to elevate privileges to the system in low-complexity attacks without any user interaction. Microsoft has credited Kaspersky Labs’ Boris Larin, Mandiant’s Genwei Jiang, and DBAPPSecurity WeBin Lab’s Quan Jin for reporting the vulnerability. Vulnerability used to deploy Nokoyawa ransomwareThe vulnerability has been used by a sophisticated cybercriminal group to deploy the Nokoyawa ransomware as a final payload, according to Kaspersky. The group is known for its use of many similar but unique CLFS driver exploits that were likely developed by the same exploit author. “Since at least June 2022, we’ve identified five different exploits used in attacks on retail & wholesale, energy, manufacturing, healthcare, software development, and other industries,” Kaspersky said in a blog post. Nokoyawa ransomware was discovered in February 2022, sharing code with another ransomware family known as Karma. The initial version of the ransomware was written in the C programming language, and a second version of the ransomware was discovered in September 2022, written in the Rust programming language.The threat group behind the ransomware performs double extortion ransomware attacks: exfiltrating sensitive information from organizations, followed by file encryption and a ransom payment demand, security firm Zscaler said in a blog post. The CLFS system vulnerabilityCVE-2023-28252 is a CLFS vulnerability that can be exploited when the system attempts to extend the metadata block. The vulnerability gets triggered by the manipulation of the base log file, according to Kaspersky. The exploit uses the vulnerability to corrupt another specially crafted base log file object in a way that a fake element of the base log file gets treated as a real one.Attackers use Cobalt Strike Beacon as their main tool. It’s launched with a variety of custom loaders aimed at preventing antivirus detection.“In this attack, cybercriminals used a newer version of Nokoyawa that is quite distinct from the JSWorm codebase. It’s written in C and has encrypted strings. It was launched with an encrypted json config provided with a “–config” command line argument,” Kaspersky said. Kaspersky said it will add more details about the vulnerability and triggers after 9 days of the release of the patch. This is to ensure that everyone has enough time to patch their systems before other actors develop exploits for CVE-2023-28252.There have been several vulnerabilities reported previously as well in the CLFS system. Searching for “Windows Common Log File System Driver Elevation Of Privilege Vulnerability” shows that there have been at least 32 such vulnerabilities (not counting CVE-2023-28252) discovered since 2018, where three of them were detected in the wild as zero days (CVE-2022-24521, CVE-2022-37969, CVE-2023-23376), according to Kaspersky. Microsoft released patches for 96 other security bugs as part of April’s Patch Tuesday, including 45 remote code execution vulnerabilities. Related content feature Are you a toxic cybersecurity boss? How to be a better CISO Horrible bosses are everywhere but cybersecurity appears to be particularly problematic, leading to talent-retention issues and security risks. Here’s how not to be a toxic CISO. By Christine Wong Apr 18, 2024 9 mins CSO and CISO Human Resources Risk Management news analysis AWS and Google Cloud command-line tools can expose secrets in CI/CD logs Cloud vendors say it is up to users to ensure sensitive command outputs are not saved in logs By Lucian Constantin Apr 17, 2024 4 mins Cloud Security Data and Information Security news SAP users are at high risk as hackers exploit application vulnerabilities Research highlights heightened threat actor interests in SAP systems, targeting poorly patched organizations. By Shweta Sharma Apr 17, 2024 4 mins Application Security Vulnerabilities news analysis Understanding CISA's proposed cyber incident reporting rules CISA’s massive rulemaking will create the first US cyber incident and ransomware payment reporting mechanism that promises to radically overhaul the workloads of most cybersecurity professionals. By Cynthia Brumfield Apr 17, 2024 10 mins Regulation Ransomware Cyberattacks PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe