HomeCyber BalkansWindows 11 Vulnerability Allows Attackers to Execute Code and Gain Access

Windows 11 Vulnerability Allows Attackers to Execute Code and Gain Access

Published on

spot_img

Microsoft has taken quick action to address a critical security vulnerability that has been discovered in Windows 11 (version 23H2), posing a risk of privilege escalation for local attackers. The flaw was exposed by security researcher Alex Birnberg at the prestigious cybersecurity competition, TyphoonPWN 2024, where he secured the third position for his demonstration of the exploit.

TyphoonPWN, known as one of the leading cybersecurity competitions, serves as a platform for security researchers worldwide to uncover vulnerabilities in commonly used software. Birnberg’s successful demonstration of the exploit, which was officially tracked as CVE-2024-30085, underscores the significance of such events in identifying and addressing serious security issues.

The vulnerability, residing in the Cloud Files Mini Filter Driver (cldflt.sys), arises from the inadequate validation of user-supplied data when parsing reparse points. The driver fails to validate the data size before copying it to a fixed-length heap-based buffer, opening the door for potential exploitation by attackers to overwrite memory and execute code in the System context, thereby granting them elevated privileges.

In the context of Windows 11, version 23H2, attackers must first acquire the ability to execute low-privileged code on the targeted system to exploit this flaw. This requirement significantly heightens the risk in situations where users have restricted system access. Independent security researchers dove into the vulnerability, pinpointing its root cause in the function HsmIBitmapNORMALOpen in the Windows Cloud Files Mini Filter Driver.

The mishandling of reparse point bitmaps allows attackers to circumvent essential checks and introduce malicious data into the system’s memory. Under specific conditions during file operations, length verification of reparse data is skipped, creating the opportunity for attackers to overwrite memory and achieve privilege escalation.

The exploit showcased at TyphoonPWN 2024 involved crafting a carefully structured reparse point to exploit the vulnerable function and attain SYSTEM-level privileges. Birnberg’s demonstration at the competition not only earned him accolades but also highlighted the depth of his technical analysis and creativity in uncovering vulnerabilities.

To mitigate the risk posed by such vulnerabilities, it is essential for organizations to adhere to best practices such as restricting administrative access to trusted users, regularly updating all Windows systems with the latest patches, monitoring system activity for unusual behavior, especially around file operations and reparse points, and employing intrusion detection systems (IDS) to detect signs of exploits.

Organizations should conduct audits on the use of the Cloud Files Mini Filter Driver and minimize external access to systems requiring elevated privileges. The recent discovery exemplifies the critical need for proactive cybersecurity measures. Microsoft’s prompt response in releasing a patch to address the vulnerability reflects the industry’s dedication to protecting users.

All users impacted by this vulnerability are strongly encouraged to prioritize system updates by applying the latest security patch provided by Microsoft. It is imperative for users to install the recent Windows update containing the patch for CVE-2024-30085 to ensure the security of their devices against this and other potential vulnerabilities.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...