/cdn.vox-cdn.com/uploads/chorus_image/image/63206347/win7.0.jpeg)
Alongside the in-the-wild Chrome 0day, @_clem1 also discovered an 0day Windows privilege escalation used in the same exploit chain: https://t.co/SEZZdK7Ebn. Used in targeted attacks, still unpatched.
— Antti Tikkanen (@anttitikkanen) March 7, 2019
Google says the Windows zero-day was only used against Windows 7 32-bit systems, and appears to work only against Win 7 systems.
— Catalin Cimpanu (@campuscodi) March 7, 2019
Microsoft is working on a fix.https://t.co/NnBQMIsGrV pic.twitter.com/J8rwDyGmSe
The Win7 zero-day is an EoP, so it can be reused in many types of exploit chains, not just together with the Chrome FileReader zero-day from last week.
— Catalin Cimpanu (@campuscodi) March 7, 2019
Google reports zero-day exploit in Windows 7, Microsoft yet to release patchhttps://t.co/lkGY4vjYPh pic.twitter.com/P2QvmifvYN
— The Verge (@verge) March 8, 2019
Google researchers uncover two zero-days affecting Chrome, Windows https://t.co/WvGW1ah21i
— Sean Lyngaas (@snlyngaas) March 8, 2019
Google reports zero-day exploit in Windows 7, Microsoft yet to release patch https://t.co/RnTdU6YKNC pic.twitter.com/zq6cO5eVRQ
— Tom Warren (@tomwarren) March 9, 2019
Google reports zero-day exploit in Windows 7, Microsoft yet to release patch https://t.co/JFKZPNKgo6#CyberSecurity #Windows7 #RwOT
— WolfiTek (@Wolfi_Tek) March 10, 2019
We released a patch today to CloudReady v72.4 for all editions on all channels. https://t.co/6CJ8HTfexK
— Neverware (@neverware) March 8, 2019