HomeCII/OTNew Vulnerability Chain Allows Windows UAC Bypass

New Vulnerability Chain Allows Windows UAC Bypass

Published on

spot_img

A medium severity vulnerability has been flagged by researchers under CVE-2024-6769, indicating a combination user access control (UAC) bypass/privilege escalation flaw in Windows that could potentially enable an authenticated attacker to acquire full system privileges. This concern was raised by Fortra, a trusted source in the cybersecurity realm, which assigned a severity score of 6.7 out of 10 on the Common Vulnerability Scoring System (CVSS) scale to this issue.

Tyler Reguly, the associate director of security R&D at Fortra, emphasized the significance of this vulnerability by highlighting that through a proof-of-concept exploit, the attacker gains the ability to shut down the system and manipulate critical system files, such as those within the C:\Windows directory. This level of access could allow the attacker to take ownership over files previously controlled by the SYSTEM account, posing a serious threat to the integrity and security of the system.

In response to Fortra’s findings, Microsoft acknowledged the research but did not categorize this as a vulnerability. The company justified its stance by referring to its concept of acceptability surrounding the presence of “non-robust” security boundaries within certain Windows components and configurations. Microsoft emphasized that administrators wield significant control over the security of a device, allowing them to disable security features, uninstall updates, and perform actions that might compromise kernel isolation.

The core of the vulnerability lies in the exploitation of Windows’ Mandatory Integrity Control (MIC) model, introduced during the Windows Vista era. By leveraging UAC and manipulating two separate exploit techniques, Fortra researchers illustrated how an already authorized user could maneuver through the system’s integrity levels, ultimately obtaining full administrative privileges without triggering UAC prompts.

To exploit CVE-2024-6769, an attacker must first establish a foothold in the targeted system with medium integrity-level privileges while belonging to the system’s administrative group. By remapping the root drive and injecting a specially crafted DLL into crucial system folders, the attacker can execute code at a high integrity level without the need for UAC approval. This process effectively grants the attacker full administrative control over the system, potentially leading to severe consequences if left unchecked.

Despite Microsoft’s reluctance to classify this as a vulnerability, Reguly and Fortra claim that the implications of this exploit warrant serious attention from businesses. Lower-integrity administrators could easily escalate their privileges, giving them unrestricted access to critical system functions like file manipulation, malware deployment, and security feature bypassing. It is crucial for organizations to remain vigilant and ensure that only verified binaries are executed to mitigate the risks posed by CVE-2024-6769.

In conclusion, while Microsoft may downplay the severity of this vulnerability, the potential impact on system security and integrity cannot be overlooked. Administrators must exercise caution and implement stringent security measures to safeguard against potential exploits that could compromise the stability and confidentiality of their systems. Vigilance and proactive security practices remain the best defense against such threats in the ever-evolving landscape of cybersecurity.

Source link

Latest articles

A critical bug in Nvidia Container Toolkit enables a full host takeover

Nvidia, a leading technology company known for its high-performance graphics processing units (GPUs), recently...

Adorable Hacks by Hackers

In a recent turn of events in the cybersecurity world, a group of hackers...

Cyber security expert deems ransomware attack on UMC a significant national security concern

The University Medical Center Health System in Lubbock, Texas, continues to face challenges as...

UK CMA Approves Amazon, Anthropic Collaboration

The U.K. Competition and Markets Authority has decided to call off its investigation into...

More like this

A critical bug in Nvidia Container Toolkit enables a full host takeover

Nvidia, a leading technology company known for its high-performance graphics processing units (GPUs), recently...

Adorable Hacks by Hackers

In a recent turn of events in the cybersecurity world, a group of hackers...

Cyber security expert deems ransomware attack on UMC a significant national security concern

The University Medical Center Health System in Lubbock, Texas, continues to face challenges as...
en_USEnglish