• BearOfaTime@lemm.ee
    link
    fedilink
    arrow-up
    6
    ·
    15 days ago

    Wow, an article full of fear mongering with zero explanation of how it works.

    Not saying it isn’t a real concern, but how it works is crucial for understanding mitigation approaches.

    • 9point6@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      edit-2
      15 days ago

      The full details of how it works will probably not be public yet in order to protect people who haven’t had a chance to patch yet

      It’s a zero user input, remote code execution exploit that doesn’t require direct physical access—that pretty much means anyone with WiFi is at risk until they patch

      • sporks_a_plenty@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        15 days ago

        Agreed.

        The exploit was discovered by a security research firm who did the right thing and reported it to the SW creator, giving them the opportunity to distribute a patch.

        Since it hasn’t yet been reported as being exploited “in the wild” publishing details on how to perform the exploit would be at best negligent, and worst carelessly malicious.

    • Spiralvortexisalie@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      15 days ago

      As someone else said there seems to be no public details. “Improper Input Validation” is about all the info given MSFT Source. It has also been reported a packet has to be sent, suggesting either being on same network or some kind of handshake issue (Source 1 Source 2). It is also said to evade conventional methods (like firewalls and canaries) so I have doubt you actually do need to be on the same network first. So If I had to guess there is some kind of issue with nearby share or wifi direct, since it affects sever versions also I can only assume something in the wifi direct implementation. Since input validation is mentioned and wifi direct can use pins, I would imagine there is some way to craft a special wifi direct packet that holds codes and windows just runs it and/or passes validation. I am just shooting in the dark but I don’t see mitigation short of disabling wi-fi or updating.