uses cookies to make interactions with the Company’s Websites easy and meaningful. When you visit one of the Company’s Websites,’s servers send a cookie to your computer. Standing alone, cookies do not personally identify you; they merely recognize your Web browser. Unless you choose to identify yourself to, either by responding to a promotional offer, opening an account, or filling out a Web form (such as a “Contact Us” or a “Free Trial” Web form), you remain anonymous to the Company. Please go to our privacy statement for details.


Trending CVEs for the Week of April 15th, 2019

CVE-2019-0859 – Yet Another Windows Zero-Day Vulnerability


This week’s trending vulnerability may sound eerily familiar. CVE-2019-0859 is an elevation of privilege vulnerability in Win32k component of Microsoft Windows operating system. Just like CVE-2019-0797, another elevation of privilege vulnerability in Win32k that we talked about a month ago, the vulnerability was detected by Kaspersky Lab researchers and is being actively exploited in the wild. In fact, this is the fifth local privilege escalation zero-day vulnerability that has affected Microsoft Windows since October of 2018.

The vulnerability can be used to establish persistent backdoors to targeted machines. An attacker who successfully exploits this vulnerability could run arbitrary code in kernel mode. The attacker could then install programs, view, change, or delete data, or create new accounts with full user rights.

Affected Products

The vulnerability affects a range of Windows OS versions, from Windows 7 to Windows 10. For a full list, refer to the  Security Focus advisory for this vulnerability.

Exploitation and Risk

Technical details about the vulnerability and how the exploit works are available in a detailed post by Kaspersky researchers.  According to them, Kaspersky Lab discovered this vulnerability when their automatic exploit prevention systems detected an attempt to abuse it. The vulnerability was being used in advanced persistent threat campaigns targeting 64-bit versions of Windows OS from Windows 7 to the latest builds of Windows 10.

In the observed attacks, a malicious executable makes use of the legitimate PowerShell framework with a Base64-encoded command, which then fetches a second-stage PowerShell script from Pastebin. That in turn executes a third and final stage, also a PowerShell script, which unpacks lightweight shellcode. The main goal of the shellcode is to make a trivial HTTP reverse shell, which then helps the attacker gain full control over the victim’s system.


A patch for this vulnerability was pushed out by Microsoft in the most recent Patch Tuesday last week (along with patches for more than 70 unique vulnerabilities). Users should update their systems as soon as possible.



Technical Details by Kaspersky Lab

Patch Information from Microsoft

Share your thoughts in our community!

Click Here

Schedule a Product Demo Today!

See how NopSec's end-to-end Cyber Exposure Management platform can organize your security chaos.