CyberSecurity SEE

New Attack Allows Hackers to Downgrade Windows and Exploit Patched Vulnerabilities

New Attack Allows Hackers to Downgrade Windows and Exploit Patched Vulnerabilities

SafeBreach Labs recently unveiled a groundbreaking attack method known as ‘Windows Downdate,’ which poses a significant threat to the security of Windows 11 systems. This new technique, developed by SafeBreach Labs researcher Alon Leviev, involves exploiting the Windows Update process to downgrade critical system components, effectively reviving previously patched vulnerabilities like the Driver Signature Enforcement (DSE) bypass.

Initially reported in August 2024 at high-profile cybersecurity conferences such as Black Hat USA 2024 and DEF CON 32, the Windows Downdate attack has garnered attention for its ability to manipulate the Windows Update mechanism to introduce vulnerabilities into fully patched Windows 11 systems.

One of the key vulnerabilities targeted by the Windows Downdate attack is the “ItsNotASecurityBoundary” DSE bypass, which allows attackers to load unsigned kernel drivers by replacing a verified security catalogue with a malicious version. By downgrading components like the “ci.dll” module, which is essential for parsing security catalogues, attackers can exploit this bypass and gain kernel-level privileges.

The exploitation of vulnerabilities in Windows systems with different levels of Virtualization-Based Security (VBS) protection has also been demonstrated by Leviev. By disabling VBS key features, such as Credential Guard and Hypervisor-Protected Code Integrity (HVCI), attackers can compromise even systems with UEFI locks for the first time.

In a statement, Leviev emphasized the significance of this attack method, stating that it renders the term “fully patched” meaningless on any Windows machine in the world. By leveraging the Windows Downdate technique, attackers can effectively turn previously fixed vulnerabilities unfixed, posing a serious challenge to system security.

Despite the complexity of the attack, organizations can take steps to mitigate the risks posed by Windows Downdate. Keeping systems up-to-date with security patches, deploying robust endpoint detection and response (EDR) solutions, and implementing strong network security measures are recommended strategies to prevent unauthorized access and data breaches.

Furthermore, enabling VBS with UEFI lock and the “Mandatory” flag can provide additional protection against Windows Downdate attacks. This configuration represents the most secure option, preventing attackers from disabling VBS even if they bypass the UEFI lock.

The implications of the Windows Downdate attack extend beyond compromising the security of Windows 11 systems. By allowing attackers to load unsigned kernel drivers and manipulate critical system components, this attack method raises concerns about the integrity of operating system components and the effectiveness of security controls.

In light of these developments, cybersecurity experts urge organizations to remain vigilant and proactive in addressing emerging threats like Windows Downdate. By staying informed about the latest attack techniques and implementing effective security measures, businesses can enhance their resilience against evolving cybersecurity risks.

Source link

Exit mobile version