Microsoft fixed vulnerability that was actively used by Russian hackers

This week, Microsoft released another monthly patchset.

In total, the technological giant has eliminated 77 vulnerabilities, two of which pose a particular danger, since cybercriminals are actively used them in real attacks.

These security issues have been assigned the identifiers CVE-2019-0880 and CVE-2019-1132. Both of these gaps lead to an increase in privileges in the attacked system.

In other words, the attackers first penetrate the victim’s computer, and then use the aforementioned holes to enhance rights.

More serious of the two vulnerabilities – CVE-2019-1132 – is contained in the Win32k component. Experts of the antivirus company ESET discovered it when they studied the attacks of hackers connected with the Russian government.

“The zero-day was discovered by ESET as part of the attack chain of a group of Russian state-funded hackers. The company told it plans to publish an in-depth blog post about these attacks and the zero-day soon”, – reported ZDNet journalists.

The second vulnerability (CVE-2019-0880) has the same essence, but affects another component of the system – splwow64.exe. Researchers have found this problem.

Vulnerability affects Windows 10, 8.1, Server 2012, Server 2016, Server 2019, as well as Server 1803 and 1903 versions, but in real attacks it was exploited only in older versions of Windows. Details about the malicious campaigns that used this vulnerability are not yet known.

Experts are strongly recommended to all users to install released tuesday updates.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Brendan Smith

Cybersecurity analyst with 15+ years digging into malware and threats, from early days reverse-engineering trojans to leading incident responses for mid-sized firms.

At Gridinsoft, I handle peer-reviewed breakdowns of stuff like AsyncRAT ransomware—last year, my guides helped flag 200+ variants in real scans, cutting cleanup time by 40% for users. Outside, I write hands-on tutorials on howtofix.guide, like step-by-step takedowns of pop-up adware using Wireshark and custom scripts (one post on VT alternatives got 5k reads in a month).

Certified CISSP and CEH, I’ve run webinars for 300+ pros on AI-boosted stealers—always pushing for simple fixes that stick, because nobody has time for 50-page manuals. Tools of the trade: Splunk for hunting, Ansible for automation, and a healthy dose of coffee to outlast the night shifts.

Leave a Reply

Sending