КућаЦИИ/ОТNew Vulnerability Chain Allows Windows UAC Bypass

New Vulnerability Chain Allows Windows UAC Bypass

Објављено на

spot_img

A medium severity vulnerability has been flagged by researchers under CVE-2024-6769, indicating a combination user access control (UAC) bypass/privilege escalation flaw in Windows that could potentially enable an authenticated attacker to acquire full system privileges. This concern was raised by Fortra, a trusted source in the cybersecurity realm, which assigned a severity score of 6.7 out of 10 on the Common Vulnerability Scoring System (CVSS) scale to this issue.

Tyler Reguly, the associate director of security R&D at Fortra, emphasized the significance of this vulnerability by highlighting that through a proof-of-concept exploit, the attacker gains the ability to shut down the system and manipulate critical system files, such as those within the C:\Windows directory. This level of access could allow the attacker to take ownership over files previously controlled by the SYSTEM account, posing a serious threat to the integrity and security of the system.

In response to Fortra’s findings, Microsoft acknowledged the research but did not categorize this as a vulnerability. The company justified its stance by referring to its concept of acceptability surrounding the presence of “non-robust” security boundaries within certain Windows components and configurations. Microsoft emphasized that administrators wield significant control over the security of a device, allowing them to disable security features, uninstall updates, and perform actions that might compromise kernel isolation.

The core of the vulnerability lies in the exploitation of Windows’ Mandatory Integrity Control (MIC) model, introduced during the Windows Vista era. By leveraging UAC and manipulating two separate exploit techniques, Fortra researchers illustrated how an already authorized user could maneuver through the system’s integrity levels, ultimately obtaining full administrative privileges without triggering UAC prompts.

To exploit CVE-2024-6769, an attacker must first establish a foothold in the targeted system with medium integrity-level privileges while belonging to the system’s administrative group. By remapping the root drive and injecting a specially crafted DLL into crucial system folders, the attacker can execute code at a high integrity level without the need for UAC approval. This process effectively grants the attacker full administrative control over the system, potentially leading to severe consequences if left unchecked.

Despite Microsoft’s reluctance to classify this as a vulnerability, Reguly and Fortra claim that the implications of this exploit warrant serious attention from businesses. Lower-integrity administrators could easily escalate their privileges, giving them unrestricted access to critical system functions like file manipulation, malware deployment, and security feature bypassing. It is crucial for organizations to remain vigilant and ensure that only verified binaries are executed to mitigate the risks posed by CVE-2024-6769.

In conclusion, while Microsoft may downplay the severity of this vulnerability, the potential impact on system security and integrity cannot be overlooked. Administrators must exercise caution and implement stringent security measures to safeguard against potential exploits that could compromise the stability and confidentiality of their systems. Vigilance and proactive security practices remain the best defense against such threats in the ever-evolving landscape of cybersecurity.

Извор линк

Најновији чланци

U.S. Indicts 2 Top Russian Hackers, Imposes Sanctions on Cryptex – Krebs on Security

The United States has taken a significant step in combating cybercrime by unveiling sanctions...

Linux systems at risk due to CUPS vulnerabilities

A recent discovery by security researcher Simone Margaritelli has unveiled four critical vulnerabilities in...

Cyber vandalism at UK train stations escalates with spread of anti-Islam message on Wi-Fi networks

In a recent cyber attack that disrupted Wi-Fi networks at various train stations across...

Ireland’s Data Protection Commission Fines Meta €91 Million for GDPR Violation

The Data Protection Commission (DPC) in Ireland has imposed a fine of €91m ($102m)...

Више овако

U.S. Indicts 2 Top Russian Hackers, Imposes Sanctions on Cryptex – Krebs on Security

The United States has taken a significant step in combating cybercrime by unveiling sanctions...

Linux systems at risk due to CUPS vulnerabilities

A recent discovery by security researcher Simone Margaritelli has unveiled four critical vulnerabilities in...

Cyber vandalism at UK train stations escalates with spread of anti-Islam message on Wi-Fi networks

In a recent cyber attack that disrupted Wi-Fi networks at various train stations across...
sr_RSSerbian