Site icon WinCert

New Windows 10 zero-day vulnerability gives admin rights to attackers

A security flaw was discovered under Access work or school settings that manages to bypass the patch released by Microsoft back in February. This patch was released to fix the Windows Mobile Device Management information disclosure vulnerability.

Security researcher Abdelhamin Naceri has recently discovered that an incompletely patched flaw could be exploited to gain admin privileges after he publicly disclosed the spotted bug back in June.

https://twitter.com/KLINIX5/status/1460338968780804098?s=20

Mitja Kolsek who is an Opatch co-founder said that an arbitrary file disclosure can be upgraded to local privilege escalation if one knows which files to take and what to do with them. This was confirmed by using the procedure described in Rj Chandel’s blog in conjunction with Abdelhamid’s bug and being able to run code as local admin.

Microsoft is yet to release the patch for this vulnerability, leaving Windows 10 systems with the latest November 20201 security updates exposed to attack.

Luckily, this bug can only be exploited if both of the following conditions are met:

And while this vulnerability can be exploited on Windows 10 v1809 and later systems, it appears that Windows 10 v1803 and later, along with all Windows Server versions are not affected.

Exit mobile version