Linchakin

New Windows Installer Zero-Day Exploit Is in the WildByFrancisco Pires 24 November 2021A security researcher posted proof-of-concept code that exploit...

 November 24, 2021     No comments   

A recently disclosed Microsoft Windows Installer zero-day vulnerability is now being explored by malware creators. Publicly disclosed by security researcher Abdelhamid Naceri on a Github post last Sunday, the vulnerability allows for local privilege escalation from user-level privileges up to SYSTEM level - the highest security clearance possible. According to the security researcher, this exploit works in all supporting versions of Windows - including fully-patched Windows 11 and Windows Server 2022 installations. Before posting the exploit on GitHub, Naceri first disclosed it to Microsoft and worked with the company to analyze the vulnerability.

Microsoft introduced a mitigation for the CVE-2021-41379 zero-day exploit in November 2021's Patch Tuesday - but apparently failed to remediate the issue completely. Naceri then took to his GitHub post to provide a proof-of-concept exploit of the vulnerability that works even after Microsoft's mitigations were applied.

For the more technically-minded, Naceri's exploit leverages the discretionary access control list (DACL) for Microsoft Edge Elevation Service - this allows an attacker to replace any executable file on the system with an MSI file - and to run code as an administrator. BleepingComputer has tested Naceri's exploit and was able to open a command prompt with SYSTEM permissions from an account with low-level 'Standard' privileges.

Windows command-line screenshot of the privilege escalation

The researcher shared a Windows command-line screenshot of the privilege escalation. (Image credit: Abdelhamid Naceri)

Cybersecurity company Cisco Talos has provided a statement about the exploit, reporting that they've already seen instances of malware in the wild that are currently attempting to exploit the flaws. As Cisco Talos' Head of Outreach Nick Biasini told BleepingComputer, these exploitation attempts seem to be focusing on testing and tweaking the exploits as preparation for larger-scale attacks.

"During our investigation, we looked at recent malware samples and were able to identify several that were already attempting to leverage the exploit," Biasini told BleepingComputer. "Since the volume is low, this is likely people working with the proof of concept code or testing for future campaigns. This is just more evidence on how quickly adversaries work to weaponize a publicly available exploit."

Naceri explained that "the proof of concept is extremely reliable and doesn't require anything, so it works in every attempt." When it comes to mitigations, however, the researcher passes the ball to Microsoft: "The best workaround available at the time of writing this is to wait Microsoft to release a security patch, due to the complexity of this vulnerability," explained Naceri. "Any attempt to patch the binary directly will break windows installer. So you better wait and see how Microsoft will screw the patch again."

The researcher also mentioned that his work in circumventing Microsoft's CVE-2021-41379 patch attempts resulted in him finding two possible exploits: the disclosed one which we're reporting on here, and a second one that also triggers a unique behavior in the Windows Installer Service and allows for the same sort of privilege escalation technique. Naceri did say that he'll be waiting for Microsoft to completely patch the CVE-2021-41379 vulnerability before releasing the second exploit method.

On the issue, a Microsoft spokesperson told BleepingComputer that "We are aware of the disclosure and will do what is necessary to keep our customers safe and protected. An attacker using the methods described must already have access and the ability to run code on a target victim's machine." And while Microsoft initially classified this vulnerability as medium-severity (with a base CVSS score of 5.5, and a temporal score of 4.8), the fact that functional proof-of-concept code is already out in the wild and being actively exploited by malware developers should bolster the severity of the vulnerability and prompt a faster, more decisive fix from Microsoft.

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • Could an official black PS5 console soon become a reality?ByDaniel Piper 23 November 2021NewsSony just dropped the biggest hint yet.It's fair to say that the design of the PS5 has proven divisive. The console was mercilessly mocked upon launch last summer, with the white and black … Read More
  • Best Internal Hard Drives: November 2021 In our series of Hard Disk Drive guides, here’s the latest update to our list of recommended HDDs. All numbers in the text are updated to reflect pr… Read More
  • CyberheistNews Vol 11 #46 Phishing Emails Use Small Font Size To Bypass Security Filters Trends in Cybercrime Report Phishing, Non-Payment Scams, and Extortion Social engineering attacks account for the vast majority of cybercrime in the … Read More
  • SEC Warns of Spoofed Emails Impersonating Their EmployeesScammers are impersonating the US Securities and Exchange Commission (SEC) with spoofed phone calls and other communications that attempt to steal mon… Read More
  • New Dangerous and Persistent Malware Family Called "Metamorphic"Michael Kan at PCMag reported on this new strain of Windows malware.  It can constantly adapt to avoid detection and was first found targeting th… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates