{"id":6350,"date":"2020-03-25T21:57:19","date_gmt":"2020-03-25T21:57:19","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6350"},"modified":"2021-06-02T17:13:04","modified_gmt":"2021-06-02T16:13:04","slug":"new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild","title":{"rendered":"New 0-Day Vulnerability in Windows Adobe Type Manager Library Exploited in the Wild"},"content":{"rendered":"<p>Generally, Microsoft announces vulnerabilities when they release patches on their (in)famous Patch Tuesday releases. That usually means bad actors only have a chance to investigate and exploit a vulnerability after the patch is released, leaving a small window of opportunity to use the vulnerability in attacks before systems have the patch applied.<\/p>\n<p>On March 22, a 0-day vulnerability was announced that affects supported versions of Windows, including Windows 7. According to Microsoft, this vulnerability has been used in some limited targeted attacks in the wild against Windows 7. Per their\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV200006\" target=\"_blank\" rel=\"noopener noreferrer\">advisory<\/a>, an attacker would need to trick a user into opening a malicious document or viewing it in the Preview Pane of Windows Explorer. At the time of this article, Microsoft plans to release a patch for this vulnerability in April\u2019s Patch Tuesday drop.<\/p>\n<p>This means there is an increased risk over the next few weeks for files delivered via malicious emails. It should also be noted that versions of Windows 10 and the corresponding Server versions experience minimal risk from this vulnerability because the fonts are processed in a user mode AppContainer sandbox, which limits the overall impact.<\/p>\n<p>In the article, Microsoft goes on to recommend three workarounds. Which one you implement will depend on what level of impact your supported end users can tolerate. All of them will limit the ability for a user to view documents in the Preview Pane of Windows Explorer.\u00a0<em>It should also be noted that the Outlook Preview Pane is NOT included in this vulnerability<\/em>.<\/p>\n<ol>\n<li>Disable the Preview Pane and Details Pane. This will prevent the automatic display of Open Type Fonts (OTF).<\/li>\n<li>Disable the WebClient (WebDAV) service. This will prompt users to confirm before opening programs from the internet, adding another layer of decision before a file is opened. Note that this workaround will affect any WebDAV shares and render them unavailable.<\/li>\n<li>Rename ATMFD.dll on versions of Windows\u00a0<i>before<\/i>\u00a0version 1709 (the dll is not present on versions newer than this). This workaround may cause issues with any applications that use OTF.<\/li>\n<\/ol>\n<p>The workarounds can vary from system to system, and you can view the individual steps in the\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV200006\" target=\"_blank\" rel=\"noopener noreferrer\">advisory<\/a>. Consider any effects these may have on your customers before you enable any workaround. If you would like to test and execute the \u201crename ATMFD\u201d workaround, our Head Automation Nerd Marc-Andre Tanguay has built an\u00a0<a class=\"ext\" href=\"https:\/\/success.solarwindsmsp.com\/kb\/solarwinds_n-central\/Microsoft-Advisory-ADV-200006-Workaround-Remove-ATMDF-DLL\" target=\"_blank\" rel=\"noopener noreferrer\">AMP<\/a>\u00a0for you to download and review. Of course, you should run through the execution and effects on a test system before rolling out to your end users. Remember, this .dll does not exist on Windows 10 version 1709 and above.<\/p>\n<p>You should also consider other mitigations to protect against any opportunistic bad actors.<\/p>\n<h3><b>Additional mitigations<\/b><\/h3>\n<p>As with any threats that must be delivered to and accessed by an end user, it is important to ensure your other layers of protection are in place and current:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail?promo=blog\" target=\"_blank\" rel=\"noopener\"><b>Email protection<\/b><\/a>\u00a0blocks malicious emails and files and is the frontline defense to help prevent threats from making it to an end user.<\/li>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/ins-and-outs-security-awareness-training\" target=\"_blank\" rel=\"noopener\"><b>User awareness<\/b><\/a>\u00a0helps make sure users are trained not to click on attachments or download files they were not expecting. Have them be mindful of typos and odd or unfamiliar email addresses in the emails they receive and think twice before opening unsolicited attachments.<\/li>\n<li><a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/endpoint-detection-and-response?promo=blog\" target=\"_blank\" rel=\"noopener\"><b>Endpoint protection<\/b><\/a>\u00a0helps ensure your endpoint protection is up-to-date and running, and that all components (such as behavioral detection) are enabled.<\/li>\n<\/ul>\n<p>We will wait to see whether Microsoft releases an out-of-band patch or waits until the April Patch Tuesday to fix this vulnerability. At that time, you would want to undo any workarounds you put in place to restore the full experience to your end users (the instructions to undo these workarounds are also included in the advisory). If you are still running Windows 7, bear in mind that unless you have purchased an ESU agreement, you will likely not receive any patches for this vulnerability and should consider upgrading to a supported operating system, as well as ensuring other mitigations are up-to-date and protecting the affected systems.<\/p>\n<p>Let\u2019s stay safe out there!<\/p>\n<p><em>Gill Langston is head security nerd for SolarWinds MSP. You can follow Gill on Twitter at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener noreferrer\">@cybersec_nerd<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On March 22, a 0-day vulnerability was announced that affects all supported versions of Windows, including Windows 7. Find out what MSPs need to know to help protect their customers.<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6350","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>New 0-Day Vulnerability in Windows Adobe Type Manager Library Exploited in the Wild - N-able<\/title>\n<meta name=\"description\" content=\"On March 22, a 0-day vulnerability was announced that affects all supported versions of Windows, including Windows 7. Find out what MSPs need to know to help protect their customers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New 0-Day Vulnerability in Windows Adobe Type Manager Library Exploited in the Wild - N-able\" \/>\n<meta property=\"og:description\" content=\"On March 22, a 0-day vulnerability was announced that affects all supported versions of Windows, including Windows 7. Find out what MSPs need to know to help protect their customers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-25T21:57:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-02T16:13:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gill Langston\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gill Langston\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild\"},\"author\":{\"name\":\"Gill Langston\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\"},\"headline\":\"New 0-Day Vulnerability in Windows Adobe Type Manager Library Exploited in the Wild\",\"datePublished\":\"2020-03-25T21:57:19+00:00\",\"dateModified\":\"2021-06-02T16:13:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild\"},\"wordCount\":706,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Head Nerds\",\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild\",\"name\":\"New 0-Day Vulnerability in Windows Adobe Type Manager Library Exploited in the Wild - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2020-03-25T21:57:19+00:00\",\"dateModified\":\"2021-06-02T16:13:04+00:00\",\"description\":\"On March 22, a 0-day vulnerability was announced that affects all supported versions of Windows, including Windows 7. Find out what MSPs need to know to help protect their customers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New 0-Day Vulnerability in Windows Adobe Type Manager Library Exploited in the Wild\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\",\"name\":\"Gill Langston\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"caption\":\"Gill Langston\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New 0-Day Vulnerability in Windows Adobe Type Manager Library Exploited in the Wild - N-able","description":"On March 22, a 0-day vulnerability was announced that affects all supported versions of Windows, including Windows 7. Find out what MSPs need to know to help protect their customers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild","og_locale":"it_IT","og_type":"article","og_title":"New 0-Day Vulnerability in Windows Adobe Type Manager Library Exploited in the Wild - N-able","og_description":"On March 22, a 0-day vulnerability was announced that affects all supported versions of Windows, including Windows 7. Find out what MSPs need to know to help protect their customers.","og_url":"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-03-25T21:57:19+00:00","article_modified_time":"2021-06-02T16:13:04+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Gill Langston","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Gill Langston","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild"},"author":{"name":"Gill Langston","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ccb02e43837727da6ab962f5357e872a"},"headline":"New 0-Day Vulnerability in Windows Adobe Type Manager Library Exploited in the Wild","datePublished":"2020-03-25T21:57:19+00:00","dateModified":"2021-06-02T16:13:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild"},"wordCount":706,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Head Nerds","Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild","url":"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild","name":"New 0-Day Vulnerability in Windows Adobe Type Manager Library Exploited in the Wild - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2020-03-25T21:57:19+00:00","dateModified":"2021-06-02T16:13:04+00:00","description":"On March 22, a 0-day vulnerability was announced that affects all supported versions of Windows, including Windows 7. Find out what MSPs need to know to help protect their customers.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/new-0-day-vulnerability-windows-adobe-type-manager-library-exploited-wild#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/it\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"New 0-Day Vulnerability in Windows Adobe Type Manager Library Exploited in the Wild"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ccb02e43837727da6ab962f5357e872a","name":"Gill Langston","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","caption":"Gill Langston"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=6350"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6350\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=6350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}