Kaseya and latest Microsoft Vulnerability in Internet Explorer

**EDIT: It has been brought to our attention that the vulnerability runs deeper than Adobe Flash. Microsoft has released an out-of-band patch to address this issue. We’ve written another blog post here with more information.**     We have a new script that will keep the IE Vulnerability from being exploited, however the likely best solution is to follow the instructions in the above mentioned blog and carefully apply the patch.

As you have probably heard Microsoft announced a Zero-Day vulnerability for all versions of Internet Explorer, but have not really released a patch to fix it.

As it turns out, it seems as if Flash is at least partially to blame for this, and Adobe released an update for Flash yesterday, which should help take care of the problem.

One of the superpowers of a good RMM system like Kaseya is the ability to deal with issues like this, and as we all know, these problems are not infrequent.

To help you make sure that your client’s systems are protected, Virtual Administrator has 2 scripts that you can use.

First script is the Adobe Flash Audit(Active X) script.   This agent procedure will check the version of all of your machines, and write the results to the Agent Procedure log.    You can then use the standard “OOD or Out of Date” report to show which machines have old, no, or undetermined versions.

The 2nd script is the Adobe Flash Silent Install/Update(Active X) script.   This script will check the version again, and will update Flash to the latest version if needed, writing the results to the Agent Procedure log.

As best as we can tell from the information provided, as long as you update to Adobe Flash 13.0.0.206, you should be fine.

It is best to update Flash when the user is logged off, so they don’t have to restart their browser, so be careful scheduling this during working hours.

Let us know if you have any problems, or have any other ideas on how to protect your systems from this vulnerability.