A recent update fixes a 0day vulnerability in the Windows AppX installer (CVE-2021-43890), who used the Emotet.
An addition to the December 2021 patch tuesday for the AppX installer used on Windows, the Microsoft closed the Windows AppX Installer spoofing vulnerability.
The gang behind Emotet took advantage of this vulnerability to infect systems. The following is a brief overview.
The AppX-Installer used in Windows 10 and Windows 11 to install applications has a serious design flaw.
An infected payload from Emotet appears as a trusted application in the Setup dialog box. The Trusted App statement is displayed to users without any digital signatures being evaluated. Only when the user clicks on the Trusted App link does he receive the authentication notification from the publisher you see in the following tweet from the actual publisher of the application.
The Emotet team is taking advantage of this security loophole to distribute its dropper that will install ransomware as a trusted Windows application.
As early as December 14, 2021, security researcher Will Dormann tweeted that ms-appinstaller's URI had been blocked by Microsoft with an update.
Note that as of today's updates (CVE-2021-43890), the ms-appinstaller: URI has been disabled. pic.twitter.com/tk9KpmHCy8
- Will Dormann (@wdormann) December 14, 2021
Dormann posted the issue in a series of tweets from December 1, 2021. If Windows users were logged in as administrators, it could be abused because ms-appinstaller: is a URL protocol through which install AppX from almost anywhere. Even opening a Microsoft Office document was enough.
Dormann then recommended activating the "Prevent non-administrators from installing packaged Windows applications" policy group or disabling the ms-appinstaller via the reg file for all users.
Do your users log in as administrators? No? Good!
Set the "Prevent non-admin users from installing packaged Windows apps" group policy to avoid foot-shooting.
Do they log in as admins? Interesting choice...
Maybe unregister ms-appinstaller for EACH user.https://t.co/kttJZfRgEX pic.twitter.com/QiYg8XhlPM- Will Dormann (@wdormann) December 2, 2021
But as of December 14, 2021, Microsoft has released the Windows AppX Installer Spoofing Vulnerability security page CVE-2021-43890, which confirms all of the above and reveals the CVE.
Microsoft is aware of attacks that attempt to exploit this vulnerability with specially designed packages containing the Emotet / Trickbot / Bazaloader malware.
In addition, Microsoft has updated the AppX Installer (Desktop Installer):
- Microsoft Desktop Installer 1.16 for Windows 10 version 1809 or later
- Microsoft Desktop Installer 1.11 for Windows 10 version 1709 or Windows 10 version 1803
