Dustin Childs said security vendors were able to obtain advanced access to the flaw earlier this month, after it was discovered in May.
Widespread intrusions compromising vulnerable on-premises Microsoft SharePoint servers are believed to have been facilitated by the exposure of bug details from the Microsoft Active Protections Program.
Speaking to The Register, Trend Micro’s Zero Day Initiative head of threat awareness Dustin Childs said security vendors were able to obtain advanced access to the flaw earlier this month - after being discovered in May.
"The first MAPP drop occurs at what we call r minus 14, which is two weeks ahead of the [Patch Tuesday] release. Then, on July 7th, we started to see attacks. July 8th, the patches were out and were almost immediately bypassed," said Childs.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.