CPLINK and Win32/CplLnk.A are names for a Microsoft Windows shortcut icon vulnerability discovered in June 2010 and patched on 2 August that affected all Windows operating systems. The vulnerability is exploitable when any Windows application that displays shortcut icons, such as Windows Explorer, browses to a folder containing a malicious shortcut. The exploit can be triggered without any user interaction, regardless where the shortcut file is located.
In June 2010, VirusBlokAda reported detection of zero-day attack malware called Stuxnet that exploited the vulnerability to install a rootkit that snooped Siemens' SCADA systems WinCC and PCS 7. According to Symantec it is the first worm designed to reprogram industrial systems and not only to spy on them.
References
- "Microsoft Security Bulletin MS10-046 - Critical / Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198)". Microsoft. 2 August 2010. Retrieved 21 November 2011.
- "Microsoft issues 'critical' patch for shortcut bug". BBC News. 2 August 2010. Retrieved 21 November 2011.
- "Encyclopedia entry: Exploit:Win32/CplLnk.A". Microsoft. Jul 16, 2010. Retrieved 27 July 2010.
- ^ Wisniewski, Chester (2010-07-27). "AskChet, Episode 2, July 26, 2010 - Sophos security news". SophosLabs. Retrieved 27 July 2010.
- Wisniewski, Chester (2010-07-26). "Shortcut exploit still quiet - Keep your fingers crossed". Sophos. Archived from the original on 1 August 2010. Retrieved 27 July 2010.
- Mills, Elinor (2010-07-21). "Details of the first-ever control system malware (FAQ)". CNET. Retrieved 21 July 2010.
- "SIMATIC WinCC / SIMATIC PCS 7: Information concerning Malware / Virus / Trojan". Siemens. 2010-07-21. Retrieved 22 July 2010.
malware (trojan) which affects the visualization system WinCC SCADA.
- "Siemens: Stuxnet worm hit industrial systems". Archived from the original on 25 May 2012. Retrieved 16 September 2010.
External links
- Microsoft Security Advisory (2286198) concerning the Windows vulnerability exploited by CPLINK.
- Infoworld article Is Stuxnet the 'best' malware ever?