Windows 7/8.1 users warned of new Internet Explorer 11 flaw

The flaw was uncovered by security researchers and demonstrates how hackers can hijack websites

Internet Explorer

Windows 7 and Windows 8.1 users are at risk from a new zero-day vulnerability in Internet Explorer 11, security researchers have warned, although Microsoft claims the flaw is yet to be exploited.

The proof-of-concept (POC) flaw was uncovered by researcher David Leo at Deusen and is described as 'Universal Cross Site Scripting(XSS)' allowing the content on domains (The Daily Mail was used as an example) to be changed remotely using modified browser cookies.

Additionally, it could mean hackers are able to insert malicious content into browsers, scrape personal data or track movements online using unsavoury web pages as a mask.

Symantec added this means someone could exploit the vulnerability to steal information. It said in a blog post: "This zero-day vulnerability could allow an attacker to bypass the same-origin policy (SOP) in order to steal from and inject information into other websites," explained the team in an advisory.

"Microsoft has not yet issued a patch or security advisory for this vulnerability. At this time, there are no indications that this vulnerability has been exploited in the wild."

Although Microsoft has implemented its Smart Screen technology on newer versions of Internet Explorer, designed to protect against phishing attacks like this, the concern is more hackers will use the method before the company fixes the flaw.

In order to take advantage of the vulnerability, a hacker would have to lure a user to a malicious website, Microsoft said in a statement: "We continue to encourage customers to avoid opening links from untrusted sources and visiting untrusted sites, and to log out when leaving sites to help protect their information."

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Recommended

Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

29 Oct 2020
REvil hacking group says it has made more than $100m in a year
Security

REvil hacking group says it has made more than $100m in a year

29 Oct 2020
36 billion personal records exposed by hacks in 2020 so far
Security

36 billion personal records exposed by hacks in 2020 so far

29 Oct 2020
Trump website defaced in second successive cyber breach
Security

Trump website defaced in second successive cyber breach

28 Oct 2020

Most Popular

Do smart devices make us less intelligent?
artificial intelligence (AI)

Do smart devices make us less intelligent?

19 Oct 2020
Politicians need to stop talking about technology
Policy & legislation

Politicians need to stop talking about technology

21 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020