Security Researcher Uncovers New Windows Zero-day Exploit

Share post:

Security researcher Abdelhamid Naceri recently discovered a new Windows zero-day local privilege elevation vulnerability that allows admin privileges in various Windows operating systems.

The vulnerability affects all versions of Windows including Windows 10, 11, and Windows Server 2022. With the vulnerability in the wrong hands, threat actors with limited access to a compromised device can use it to increase their privileges to spread to any tentacle within the system or network.

Naceri explained how the bug works with his proof-of-concept exploit: “This variant was discovered during the analysis of CVE-2021-41379 patch. the bug was not fixed correctly, however, instead of dropping the bypass. I have chosen to drop this variant as it is more powerful than the original one.”

In another revelation, Naceri pointed out that it is possible to prevent ‘Standard’ users from performing MSI installation operations by configuring group policies.

For more information, read the original story in Bleeping Computer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday, March 1, 2024

This episode features a discussion on how hard it is to kill a ransomware gang, Canada's proposed new online harms bill, why organizations still allow staff to use vulnerable software

Healthcare sector “stretched thin” in fight against cyber attacks warns CSO of Health-ISAC

In an interview Errol Weiss talks about the challenges facing hospitals a

Cyber Security Today, March 1, 2024 – Warnings to GitHub users and Ivanti gateway administrators, and more

This episode reports on a recommendation that enterprises drop Ivanti Policy Secure and Connect Secure devices because threat actors can get around mitigations for recent vulne

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways