HomeCII/OTWindows 'Downdate' Attack Exposes Patched PCs to Vulnerabilities

Windows ‘Downdate’ Attack Exposes Patched PCs to Vulnerabilities

Published on

spot_img

A recent discovery has shed light on a significant vulnerability in fully patched Windows 11 systems that could leave them open to attacks by cyber adversaries. These attacks could result in the installation of custom rootkits, bypassing endpoint security mechanisms, and maintaining persistence on compromised systems. The vulnerability was demonstrated by security researcher Alon Leviev at the Black Hat USA 2024 conference in August, where he showcased the use of a Windows OS downgrade attack technique to exploit fully patched Windows components.

Leviev’s exploit tool, Windows Downdate, allows an attacker with admin-level access to tamper with the Windows Update process and revert critical OS components, such as dynamic link libraries, drivers, and the kernel, back to a vulnerable state. This manipulation effectively renders the term “fully patched” meaningless on any Windows machine worldwide. Despite Leviev reporting two vulnerabilities (CVE-2024-21302 and CVE-2024-38202) to Microsoft, the company has yet to address the ability for an attacker to abuse the Windows Update process to downgrade OS components.

The issue lies in Microsoft’s stance regarding the crossing of security boundaries, where an admin-level user gaining kernel code execution is not considered a security breach. Leviev highlighted this by releasing details of a new downgrade attack on Oct. 26, showcasing how his Windows Downdate tool could revive a driver signature enforcement bypass attack that Microsoft had previously patched. This attack could lead to the loading of unsigned kernel drivers and the deployment of customized rootkits.

The exploit, known as the “ItsNotASecurityBoundary” DSE bypass, exploits false file immutability to trick the operating system into using outdated, exploitable files. Leviev demonstrated that downgrading a specific OS module, CI.dll, could effectively compromise a fully patched Windows 11 system, even with VBS enabled. To fully mitigate this attack, VBS must be enabled with UEFI lock and the ‘Mandatory’ flag, preventing an attacker from downgrading critical OS components.

Tim Peck, a senior threat researcher at Securonix, explained that these attacks leverage the OS’s failure to validate version numbers of DLLs, enabling the use of outdated files that are more susceptible to exploitation. If Windows Defender were downgraded, attackers could execute malicious files undetected. Microsoft has acknowledged the issue and is actively working on mitigations to protect against these risks by revoking outdated, unpatched VBS system files.

Additionally, Microsoft is conducting thorough testing to ensure the effectiveness of these mitigations. Updates on CVE-2024-21302 will continue to be provided, along with additional mitigation strategies as they become available. It is crucial for users to remain vigilant and implement necessary security measures to protect their systems from potential downgrade attacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...