{"id":2436,"date":"2020-03-28T19:50:59","date_gmt":"2020-03-28T17:50:59","guid":{"rendered":"https:\/\/www.identitycosmos.com\/?p=2338"},"modified":"2020-03-28T19:50:59","modified_gmt":"2020-03-28T17:50:59","slug":"zero-day-adv200006-how-to-use-gpos-to-mitigate-your-windows-risks","status":"publish","type":"post","link":"https:\/\/identitycosmos.com\/index.php\/2020\/03\/28\/zero-day-adv200006-how-to-use-gpos-to-mitigate-your-windows-risks\/","title":{"rendered":"Zero-day ADV200006 \u2013 How to use GPOs to mitigate your Windows risks"},"content":{"rendered":"<h1>What is the problem?<\/h1>\n<p>As you may know, a new zero-day vulnerability (ADV200006) was raised by the security community. This vulnerability targets Windows systems with Adobe Acrobat installed on it, so as you can imagine, it is a very large impact. The problem occurs if the user opens some infected PDF documents or if the user uses thumbnails in the preview pane to visualize a PDF document.<\/p>\n<p>ADV200006 is using <strong>Adobe Type Manager<\/strong> which is managed by the <strong>atmfd.dll<\/strong> file. The <strong>atmfd.dll<\/strong> file is a kernel module provided by Windows. Using a specially infected document opened or view it in the Windows preview pane, an unauthenticated remote attacker may be able to execute additional code using this Adobe Type Manager Library with kernel privileges on a vulnerable system.<\/p>\n<p>If you are using the sandbox feature on Windows 10, the impact of the attack is limited \u2013 but if you are using Windows 10 without sandbox feature activated or a previous version of Windows on your workstations, it will be a huge risk for your organization.<\/p>\n<p>Unfortunately, Microsoft didn&#8217;t provided any fix (date is today 2020\/03\/28) for the moment \u2013 for sure it will \u2013 in the meantime you must deploy a workaround to change your workstations configuration and be able to wait for the Microsoft patch.<\/p>\n<p>You can read more details about ADV200006 using this Microsoft link: <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/adv200006\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/adv200006<\/a><\/p>\n<h1>How to mitigate this in a corporate environment?<\/h1>\n<p>You can use different mitigation methods, but there are existing some variations depending which Windows versions you are using on your corporate network. So, I choose to describe a mitigation method which will work on your different operating systems from Vista to 10.<\/p>\n<p><span style=\"font-size: 12pt; text-decoration: underline;\"><strong>Create the first GPO with the user part of the mitigation settings<br \/>\n<\/strong><\/span><\/p>\n<p>Open your GPMC console.<\/p>\n<p>Right click on the &#8220;Group Policy Objects&#8221; folder and select the New option:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV21.png\" alt=\"\" \/><\/p>\n<p>For example, name your GPO &#8220;GPO_SECU_zeroD_ADV2000068_U-settings&#8221;.<\/p>\n<p>Right click on the new GPO and select the <strong>Edit\u2026<\/strong> option:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV22.png\" alt=\"\" \/><\/p>\n<p>Go to <strong>User Configuration | Policies | Administrative Templates | Windows Components<\/strong> \u2013 Select <strong>File Explorer<\/strong> section:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV23.png\" alt=\"\" \/><\/p>\n<p>Set to <strong>Enabled<\/strong> these two GPO options: &#8220;<strong>Turn off display of thumbnails and only display icons<\/strong>&#8221; + &#8220;<strong>Turn off the display of thumbnails and only display icons on network folders<\/strong>&#8220;:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV24.png\" alt=\"\" \/><\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV25.png\" alt=\"\" \/><\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV26.png\" alt=\"\" \/><\/p>\n<p>So, at the end you should have this:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV27.png\" alt=\"\" \/><\/p>\n<p>Close you GPO and link this GPO with all the automation office user accounts in your organization (in a nutshell, all the user accounts which can be used on your workstation).<\/p>\n<p><span style=\"font-size: 12pt; text-decoration: underline;\"><strong>Create the second GPO with the computer part of the mitigation settings<br \/>\n<\/strong><\/span><\/p>\n<p><span style=\"text-decoration: underline;\">Important<\/span>: you must use the GPMC tool from a workstation, not from a server, because the service we will want to control doesn&#8217;t have the same name on a Windows Server operating system.<\/p>\n<p>Open your GPMC console.<\/p>\n<p>Right click on the &#8220;Group Policy Objects&#8221; folder and select the New option:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV28.png\" alt=\"\" \/><\/p>\n<p>For example, name your GPO &#8220;GPO_SECU_zeroD_ADV2000068_C-settings&#8221;.<\/p>\n<p>Right click on the new GPO and select the <strong>Edit\u2026<\/strong> option:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV29.png\" alt=\"\" \/><\/p>\n<p>Go to <strong>Computer Configuration | Policies | Windows Settings | Security Settings<\/strong> \u2013 Select <strong>System Services<\/strong> section:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV210.png\" alt=\"\" \/><\/p>\n<p>Double click on the <strong>WebClient<\/strong> service in the right panel and select the following options:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV211.png\" alt=\"\" \/><\/p>\n<p>So, at the end you should have this:<\/p>\n<p><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2020\/03\/032820_1749_ZerodayADV212.png\" alt=\"\" \/><\/p>\n<p>Close you GPO and link this GPO with all the workstation computer accounts in your organization.<\/p>\n<h1>What is next?<\/h1>\n<p>Now you must follow and check when Microsoft will release a patch for this zero-day vulnerability. Have a look on this link: <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/adv200006\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/adv200006<\/a> or follow the your habitual security gurus.<\/p>\n<p>When you will get the patch from Microsoft, and after you will apply it, you will be able to revert these two GPOs.<\/p>\n<p>Stay safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is the problem? As you may know, a new zero-day vulnerability (ADV200006) was raised by the security community. This vulnerability targets Windows systems with Adobe Acrobat installed on it, so as you can imagine, it is a very large impact. The problem occurs if the user opens some infected PDF documents or if the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,1],"tags":[22,107],"class_list":["post-2436","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-non-classe","tag-adv200006","tag-gpo"],"_links":{"self":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/2436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/comments?post=2436"}],"version-history":[{"count":0,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/2436\/revisions"}],"wp:attachment":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/media?parent=2436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/categories?post=2436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/tags?post=2436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}