A remote code execution vulnerability exists in the following versions of Java:
Java Development Kit 7 Update 10 and earlier
Java Runtime Environment 7 Update 10 and earlier
The vulnerability allows attackers to remotely execute arbitrary code in a vulnerable system. To exploit this vulnerability, an attacker must lure users to access a compromised website or a malicious webpage, where a malicious Java applet targeting the vulnerability is hosted. The execution of the malicious applet within the browser of the unsuspecting user then allows the attacker to execute arbitrary code in the vulnerable system. Users with vulnerable systems may find themselves infected with ransomware, which Trend Micro detects as TROJ_REVETON.RJ and TROJ_REVETON.RG. Exposure to such malware may result in financial loss.
Note that Java Development Kit and Java Runtime Environment versions 6, 5.0 and 1.4.2, and Java Standard Edition Embedded JRE releases are not affected by this vulnerability.
TREND MICRO PROTECTION INFORMATION
It is strongly advised to download Java's latest update, which patches the vulnerability targeted by this attack. The patch increments the latest version of Java 7 to Update 11, and may be downloaded from the official Java website.
If you need to disable Java, you may perform the following steps:
Disabling Java in Internet Explorer:
To prevent any Java app, signed or unsigned, from running in Internet Explorer:
Open the Java Control Panel. IE users can do this by clicking Start, then clicking on the Control Panel option.
Look for the Java icon to open the Java Control Panel. You can use the Search field to make this easier.
Double-click the Java icon. This brings up the Java Control Panel.
In the Java Control Panel, go to the Security tab.�
In the Security tab, un-check the Enable Java content in the browser. This option disables the Java plug-in from running in your browser.
Click Apply. When the Windows User Account Control (UAC) dialog appears, allow permissions to make the changes.
Click OK in the Java Plug-in confirmation window.
Restart Internet Explorer for the changes to take effect.
Disabling Java in other browsers:
Find out how to open the Java Control Panel, which varies depending on your operating system and browser, through this Oracle page.
Setting the Security Level of Unsigned Apps
A security level has been added to the Java Control Panel, accessible through its Security tab. This enables you to control the browser's behavior when it attempts to run unsigned apps. You can select Low, Medium, High or Very High security settings.
The default security level is High, where you are prompted before an unsigned Java app runs in the browser. You are given an option to update Java first if it is below the security baseline.
You may also choose to let unsigned apps to not run by setting the slider to Very High.
Trend Micro Solutions
Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.
Administrators of NGINX web servers running PHP-FPM are advised to patch a vulnerability (CVE-2019-11043) that can let threat actors execute remote code on vulnerable, NGINX-enabled web servers. Here’s what you need to know.