Zero trust security

Make it possible

Your Mission

 

Security Advisory - December 31, 2012

Zscaler Protects Against 0Day Vulnerability in Internet Explorer used in CFR ‘Watering Hole’ Attack

 

 

Zscaler, working with Microsoft through their MAPPs program has proactively deployed protections for the following security vulnerability in Internet Explorer. Reports recently emerged on malware hosted at the Council on Foreign Relations (CFR) website that was leveraging a previously unknown vulnerability. It is being called a ‘watering hole’ attack as it is believed that the CFR website was specifically selected to target particular users of the site. At the present time, Microsoft has released a security advisory (2794220) detailing the vulnerability and recommended workarounds until a patch is available. The Zscaler cloud will detect and block websites leveraging this new vulnerability. Zscaler will continue to monitor exploits associated with this issue and deliver additional protections as needed.

Microsoft Security Advisory (2794220)

Affected Software

  • Internet Explorer 6
  • Internet Explorer 7
  • Internet Explorer 8

CVE-2012-4792 - Vulnerability in Internet Explorer Could Allow Remote Code Execution

Description: The vulnerability is a remote code execution vulnerability that exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated.