On Monday, Microsoft released an advisory to inform users of a vulnerability affecting all supported versions of Windows, including Windows 10, Windows Server 2012, Windows Server 2016, and Windows Server 2019.
Microsoft is working on a fix for the vulnerabilities but did not provide a time frame on when the patch will be released. Or whether it will be available on patch-Tuesday or released as an out-of-band patch as it has for other zero-day exploits in the past. The next patch Tuesday is currently scheduled for April 14.
Windows 7 is also affected by this vulnerability. A patch will be developed for Windows 7, however, unless a user subscribes to Windows 7 Extended Security Updates, they will not have access to the patch. See link at the bottom for more information on the Extended Security Update program.
The active attacks target a flaw in the Adobe Type Manager Library. Two remote code execution vulnerabilities exist in Windows when the Adobe Type Library Manager improperly handles a specially crafted multimaster font called Adobe Type 1 PostScript format.
The advisory link from Microsoft can be found here:
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv200006#march-23-flaw
Information about how to get patches for products in the Extended Security Update program can be found here:
https://support.microsoft.com/en-us/help/4497181/lifecycle-faq-extended-security-updates
Please reach out to Zunesis if you have any questions regarding this advisory or need help with implementing the workarounds. We are here to help in any way that we can.