Windows Zero-Day Allows Admin Escalation, Exploit PoC is Public
Limor Sylvie Kessem, CISM, CCISO
Cyber Crisis Management Global Lead @ IBM Consulting | Certified CISO
A recent disclosure of a Windows-based zero-day flaw means that attackers could go for local privilege escalation in Windows 10, Windows 11, and Windows Server, potentially becoming an Admin.
This is a case of an enhanced vulnerability, as it bypasses a patch that Microsoft had already issued. An independent security researcher and a bug bounty hunter, Abdelhamid Naceri, found that recent patch vulnerable. Thus the workaround enhances the issue that was originally tracked as CVE-2021-41379. A working proof-of-concept exploit was publicly released by Naceri, making this matter actively perilous. Naceri decided to release the PoC publicly after seeing decreases in bounties for impactful bugs. In some people's experiences, a bounty was cut tenfold.
Advice from X-Force is in line with the current situation, and linked with MITRE ATT&CK mitigations as follows:
You can get rolling updates from X-Force here: https://exchange.xforce.ibmcloud.com/collection/Windows-Zero-Day-Allows-Admin-Escalation-6b0dee811f13a7b738bd86fe3fde6ee5
Coach de Dirigeants en Gestion de Crise Cyber, Auteur & Conférencier en Cybersécurité, Instructeur de Krav-Maga
3 年Thx Limor, useful message to be spread, ttys