Next-Generation Threat Protection Company Identifies Vulnerabilities Exploited by High-Profile Advanced Attacks
BANGALORE, India – July 23, 2013
FireEye®, Inc., the leader in stopping today’s new breed of cyber attacks, today announced that the company has discovered seven zero-day vulnerabilities during the first half of 2013. Each of the vulnerabilities uncovered by FireEye was exploited by advanced attacks across a number of applications, including Microsoft Internet Explorer, Adobe Flash, PDFs, Oracle, and Java, and highlight a growing trend of organizations seeing damage to their reputations and critical infrastructure due to highly publicized zero-day threats.
“The consistent discovery of flaws by FireEye demonstrates the power of our virtual-machine technology and the caliber of our research group,” said Zheng Bu, Senior Director of Research. “Our Multi-Vector Virtual Execution™ (MVX) engine offers a new and more sophisticated approach toward threat protection that can verify the existence and root cause of exploits before they are able to cause catastrophic damage.”
Zero-day flaws are especially dangerous because of their ability to evade detection from traditional and next-generation firewalls, intrusion prevention systems, anti-virus, and Web gateways, leaving gaping holes in network defenses. As a result, the potential for loss and theft of customer information, intellectual property, and confidential information increases.
The FireEye platform provides real-time analysis of advanced malware in a controlled environment and uses multi-vector and multi-flow virtual execution to detect next-generation threats that would otherwise go undiscovered.
“The newest generation of cybercriminals are persistent, exploiting zero-day vulnerabilities that often leave security experts unaware of the holes in their networks until the damage has already been done,” said Ashar Aziz, FireEye Founder and CTO. “To fill in the gap in network defenses, the FireEye technology is able to monitor both inbound and outbound attacks, identifying and blocking the activities of today’s most advanced cyber attacks.”
The seven zero-day flaws discovered by FireEye this year are:
- CVE-2012-4792, Internet Explorer: Allowed remote attackers to execute arbitrary code via a crafted website that triggers access to an object that was not properly allocated or was deleted.
- CVE-2013-0422, Java: Retrieved a template from the Web and created a full screen window demanding payment using some kind of social engineering scheme to scare the victim.
- CVE-2013-0634, Flash: Allowed remote attackers to execute arbitrary code or caused a denial of service (memory corruption) via crafted SWF content.
- CVE-2013-0640, CVE-2013-0641, PDF: Designed to trick Windows users into clicking on a malicious PDF file delivered in an email message.
- CVE-2013-1493, Java: Allowed successful unauthenticated network attacks via multiple protocols, which resulted in unauthorized operating system takeover including arbitrary code execution.
- CVE-2013-1347, Internet Explorer: Allowed remote attackers to execute arbitrary code via a crafted website that triggered access to an object that was not properly allocated or was deleted.
About FireEye, Inc.
FireEye is the leader in stopping next-generation threats, such as zero-day and APT attacks, that bypass traditional defenses and compromise over 95 percent of networks. The FireEye solution supplements signature-based firewalls, IPS, anti-virus, and gateways, and provide the world’s only cross-enterprise, signature-less protection against Web and email threat vectors as well as malware resident on file shares. It is the industry’s only integrated solution that stops attacks across every stage of an attack lifecycle, from exploit to exfiltration. Using its patented Virtual Execution technology platform across its portfolio, FireEye is uniquely able to protect against next-generation threats. FireEye solutions are deployed in over 40 countries and more than 25 percent of the Fortune 100.