Windows 7/8.1 users warned of new Internet Explorer 11 flaw
The flaw was uncovered by security researchers and demonstrates how hackers can hijack websites
Windows 7 and Windows 8.1 users are at risk from a new zero-day vulnerability in Internet Explorer 11, security researchers have warned, although Microsoft claims the flaw is yet to be exploited.
The proof-of-concept (POC) flaw was uncovered by researcher David Leo at Deusen and is described as 'Universal Cross Site Scripting(XSS)' allowing the content on domains (The Daily Mail was used as an example) to be changed remotely using modified browser cookies.
Additionally, it could mean hackers are able to insert malicious content into browsers, scrape personal data or track movements online using unsavoury web pages as a mask.
Symantec added this means someone could exploit the vulnerability to steal information. It said in a blog post: "This zero-day vulnerability could allow an attacker to bypass the same-origin policy (SOP) in order to steal from and inject information into other websites," explained the team in an advisory.
"Microsoft has not yet issued a patch or security advisory for this vulnerability. At this time, there are no indications that this vulnerability has been exploited in the wild."
Although Microsoft has implemented its Smart Screen technology on newer versions of Internet Explorer, designed to protect against phishing attacks like this, the concern is more hackers will use the method before the company fixes the flaw.
In order to take advantage of the vulnerability, a hacker would have to lure a user to a malicious website, Microsoft said in a statement: "We continue to encourage customers to avoid opening links from untrusted sources and visiting untrusted sites, and to log out when leaving sites to help protect their information."
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now
Simplify cluster security at scale
Centralised secrets management across hybrid, multi-cloud environmentsDownload now
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
2021 state of IT asset management report
The role of IT asset management for maximising technology investmentsDownload now