{"id":2986,"date":"2024-09-25T20:44:31","date_gmt":"2024-09-25T20:44:31","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2986"},"modified":"2025-07-29T06:53:18","modified_gmt":"2025-07-29T06:53:18","slug":"threat-advisory-adobe-flash-player-multiple-vulnerabilities-exploited-in-the-wild","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/threat-advisory-adobe-flash-player-multiple-vulnerabilities-exploited-in-the-wild\/","title":{"rendered":"Threat Advisory: Adobe Flash Player Multiple Vulnerabilities exploited in the wild"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"158\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/well.webp\" alt=\"Sign words\" class=\"wp-image-2988\"\/><\/figure>\n<\/div>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"745\" height=\"102\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/image-25.webp\" alt=\"\" class=\"wp-image-2987\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>CVSS V3 Base Score Metrics<\/strong><\/td><\/tr><tr><td><strong>CVE-ID<\/strong><\/td><td><strong>CVE-2018-4878<\/strong><\/td><td><strong>CVE-2018-4877<\/strong><\/td><\/tr><tr><td><strong>Exploitability Metrics<\/strong><\/td><td>Attack Vector<\/td><td>Network<\/td><td>Network<\/td><\/tr><tr><td>Attack Complexity<\/td><td>Low<\/td><td>Low<\/td><\/tr><tr><td>Privileges Required<\/td><td>None<\/td><td>None<\/td><\/tr><tr><td>User Interaction<\/td><td>Required<\/td><td>Required<\/td><\/tr><tr><td>Scope<\/td><td>Unchanged<\/td><td>Unchanged<\/td><\/tr><tr><td><strong>Impact Metrics<\/strong><\/td><td>Confidentiality<\/td><td>High<\/td><td>High<\/td><\/tr><tr><td>Integrity<\/td><td>High<\/td><td>High<\/td><\/tr><tr><td>Availability<\/td><td>High<\/td><td>High<\/td><\/tr><tr><td><strong>Type<\/strong><\/td><td>Use After Free\/Remote Code Execution<\/td><td>Use After Free\/Remote Code Execution<\/td><\/tr><tr><td><strong>Base Score<\/strong><\/td><td>8.8<\/td><td>8.8<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Affected Products<\/strong><\/td><\/tr><tr><td><strong>Adobe Flash Player <\/strong>Desktop Runtime version 28.0.0.137 and earlier versions for Windows, Linux and Macintosh.Google Chrome version 28.0.0.137 and earlier for Windows, Macintosh, Linux and Chrome OS.Microsoft Edge and Internet Explorer 11 version 28.0.0.137 and earlier for Windows 10 and 8.1.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Vulnerability Information<\/strong><\/td><\/tr><tr><td><strong>#<\/strong><\/td><td><strong>Vulnerability<\/strong><strong>ID<\/strong><\/td><td><strong>Description<\/strong><\/td><\/tr><tr><td><strong>1<\/strong><\/td><td><strong>CVE-2018-4878<\/strong><\/td><td>A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to the handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.<\/td><\/tr><tr><td><strong>2<\/strong><\/td><td><strong>CVE-2018-4877<\/strong><\/td><td>A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to quality of service functionality. A successful attack can lead to arbitrary code execution.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Safeguards\/Recommendations<\/strong><\/td><\/tr><tr><td>Software updates are given below:Adobe Flash Player Desktop Runtime Version 28.0.0.161Updates are available at <a href=\"https:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\" rel=\"noopener\">Flash Player Download Center<\/a> and <a href=\"https:\/\/www.adobe.com\/in\/products\/players\/flash-player-distribution.html\" target=\"_blank\" rel=\"noopener\">Flash Player Distribution<\/a>Adobe Flash Player for Google Chrome Version 28.0.0.161Updates are available at <a href=\"https:\/\/chromereleases.googleblog.com\/\" target=\"_blank\" rel=\"noopener\">Google Chrome Releases<\/a>Adobe Flash Player for Microsoft Edge and Internet Explorer 11 Version 28.0.0.161Updates are available at <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180004\" target=\"_blank\" rel=\"noopener\">Microsoft Security Advisory<\/a>Adobe Flash Player installed with Google Chrome will be automatically updated to the latest Google Chrome version, which will include Adobe Flash Player 28.0.0.161 for Windows, Macintosh, Linux and Chrome OS.Adobe Flash Player installed with Microsoft Edge and Internet Explorer 11 for Windows 10 and 8.1 will be automatically updated to the latest version, which will include Adobe Flash Player 28.0.0.161.Vendor <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb18-03.html\" target=\"_blank\" rel=\"noopener\">advisory<\/a> is available.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>IOCs<\/strong><\/td><\/tr><tr><td>hxxp:\/\/www.1588-2040.co[.]kr\/conf\/product_old.jpg<br>hxxp:\/\/www.1588-2040.co[.]kr\/conf\/product.jpg<br>hxxp:\/\/www.1588-2040.co[.]kr\/design\/m\/images\/image\/image.php<br>hxxp:\/\/www.dylboiler.co[.]kr\/admincenter\/files\/board\/4\/manager.php<br>hxxp:\/\/www.korea-tax[.]info\/main\/local.php<br>hxxp:\/\/www.korea-tax[.]info\/main\/local.phploadswf_SWFBClass<br>hxxp:\/\/www.dylboiler.co[.]kr\/service\/store.php<br>hxxp:\/\/www.dylboiler.co[.]kr\/admincenter\/files\/boad\/4\/manager.php<br>1f93c09eed6bb17ec46e63f00bd40ebb<br>4c1533cbfb693da14e54e5a92ce6faba<br>5f97c5ea28c0401abc093069a50aa1f8<br>9593d277b42947ef28217325bcc1fe50<br>394e52e219feb1a5c403714154048728<br>d2881e56e66aeaebef7efaa60a58ef9b<br>111d205422fe90848c2f41cc84ebd96a<br>3142fc8c1142f25698dabe8921996753<br>3f98c434d7b39de61a8b459180dd46a3<br>a47176bbc8aa136eb2814f3113617af7<br>f75a5e7ecc26c089c8d20406ea192c49<br>PDB path: F:\\work\\flash\\obfuscation\\loadswf\\src<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>AV detection<\/strong><\/td><\/tr><tr><td>McAfee&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;: Exploit-CVE2018- 4878.b<br>Kaspersky&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;: Exploit.SWF.Agent.rs<br>Sophos&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;: Exp\/20184878-A<br>ESET-NOD32 &nbsp;: SWF\/Exploit.CVE-2018- 4878.A<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Mitigations<\/strong><\/td><\/tr><tr><td>Administrators may also consider implementing <a href=\"https:\/\/support.office.com\/en-us\/article\/what-is-protected-view-d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653\" target=\"_blank\" rel=\"noopener\">Protected View<\/a> for Office.&nbsp; Protected View opens a file marked as potentially unsafe in Read-only mode.It is safe to uninstall\/disable Adobe Flash from all machines in your organization.Disable Flash on a browser that does not display untrusted Flash content OR enable Click to Play function.Open the Security tab from &#8220;Internet Options&#8221; in Internet Explorer and set the security level of Internet zone and local intranet zone to &#8220;High&#8221;.Be careful not to open suspicious office files coming via unknown sender.If you are running Internet Explorer on Flash Player 27 or later and Windows 7 or later you may be able to avoid running it by prompting, to play SWF content.<a href=\"https:\/\/otx.alienvault.com\/indicator\/yara\/51e40218c65dcf2eb04ec90a56ee388dcda81765\" target=\"_blank\" rel=\"noopener\">Yara rule<\/a> implementation (not tested)Snort Rule<br>alert tcp $HOME_NET any -&gt; $EXTERNAL_NET $HTTP_PORTS (msg:\u201dPossible CVE-2018-4878 check-in alert\u201d; flow:established,to_server; http_uri; content:\u201d?id=\u201d; http_uri; content:\u201d&amp;fp_vs=\u201d; http_uri; content:\u201d&amp;os_vs=\u201d; http_uri; reference: source, Vitali Kremez-Flashpoint; classtype:Trojan-activity; rev:1;)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Version History<\/strong><\/td><\/tr><tr><td><strong>Version 1.0<\/strong><\/td><td>Initial Report with Safeguards\/Recommendations and the released fixes.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n","protected":false},"excerpt":{"rendered":"<p>CVSS V3 Base Score Metrics CVE-ID CVE-2018-4878 CVE-2018-4877 Exploitability Metrics Attack Vector Network Network Attack Complexity Low Low Privileges Required None None User Interaction Required Required Scope Unchanged Unchanged Impact Metrics Confidentiality High High Integrity High High Availability High High Type Use After Free\/Remote Code Execution Use After Free\/Remote Code Execution Base Score 8.8 8.8 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2988,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2986","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2986"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2986\/revisions"}],"predecessor-version":[{"id":4349,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2986\/revisions\/4349"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2988"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}