Adobe to Patch Flash Zero-Day Discovered in South Korean Attacks

Critical use-after-free vulnerability being used in targeted attacks.

Dark Reading logo in a gray background | Dark Reading

A previously unknown and critical flaw in Adobe Flash found being exploited in targeted attacks against victims in South Korea will be patched the week of February 5.

Adobe today confirmed a report yesterday by South Korea's Computer Emergency Response Team (KrCERT/CC) of the discovery of the zero-day vulnerability in Flash Player ActiveX 28.0.0.137 and earlier versions. The bug (CVE-2018-4878) abused in the attacks is a use-after-free vulnerability that allows remote code execution, according to Adobe's advisory.

Johannes Ullrich, head of the SANS Internet Storm Center, says the fact that this was a targeted, zero-day attack makes it more likely to be the handiwork of a nation-state actor.

"The attack was rather limited, and targeted at individuals in South Korea who are involved in research about North Korea. I think this makes for a pretty strong case that this was a nation-state sponsored attack. Other actors would have little motivation to use a zero-day exploit in an attack against a group like this," Ullrich says. "On the other hand, it doesn't have to be North Korea," given the difficulty of attribution.

A researcher from South Korea in a tweet today said North Korea was behind the attacks, and the victims all conduct research on North Korea. Simon Choi, who is director of the security research center at Hauri, said the zero-day exploit had been in use since mid-November by North Korea. 

John Bambenek, manager of threat systems at Fidelis Cybersecurity, says the ideological theme of the attacks' targeting could mean the Lazarus Group is behind the attacks, but it's difficult to discern without the technical details from the South Korean CERT. Even so, the Lazarus Group isn't known for employing homegrown zero-day exploits, he says.

The Flash vulnerability was spotted targeting Windows users via emails with Office documents that contain embedded and malware-laden Flash content. "Successful exploitation could potentially allow an attacker to take control of the affected system," according to Adobe's advisory.

While awaiting the patch, an attack can be mitigated by configuring Flash Player 27 and above on Windows 7 and below (running Internet Explorer) to prompt the user before playing Flash content. Protected View for Office also can be set up for Windows that marks files as potentially unsafe, leaving them in Read-Only mode for users, Adobe noted in its advisory.

Products affected by the vulnerability include Adobe's Flash Player Desktop Runtime on Windows and Mac; Flash Player for Google Chrome on Windows, Mac, Linux, and Chrome OS; Flash for Microsoft Edge and Internet Explorer 11 on Windows 10 and 8.1; and Flash Player Desktop Runtime on Linux.

Related Content:

About the Author

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights