All Windows Versions Impacted by LPE Zero-day Vulnerability

Share post:

A Windows zero-day privilege elevation vulnerability was recently uncovered after proof-of-concept (PoC) was released by security researcher Abdelhamid Naceri.

This unpatched vulnerability affects all versions of Windows including Windows 10, 11, and Windows Server 2022.

While the vulnerability may allow users to gain SYSTEM privileges under certain conditions, it however requires a threat actor to know another user’s username and password in a bid to trigger the vulnerability.

Microsoft originally released an update for a “Windows User Profile Service Elevation of Privilege Vulnerability” in August to fix the vulnerability discovered by Naceri as CVE-2021-34484. However, this was not enough, as Naceri discovered that he could work around it with a new exploit that could cause an elevated command prompt to be started with SYSTEM privileges while displaying the User Account Control (UAC) prompt for user accounts.

<span class=”s1″> </span>Naceri clarified, “Technically, in the previous report CVE-2021-34484. I described a bug where you can abuse the user profile service to create a second junction. But as I see from ZDI advisory and Microsoft patch, the bug was metered as an arbitrary directory deletion bug. Microsoft didn’t patch what was provided in the report but the impact of the PoC. Since the PoC I wrote before was horrible, it could only reproduce a directory deletion bug.”

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways