Advance Windows 10 Zero-day Permit the Admin Rights, Gets Unofficial Patch

Free unofficial patches have been updated to provide security to Windows users from a local privilege escalation (LPE) zero-day vulnerability in the Mobil Device Management Service affecting Windows 10, version 1809 and later. The security bug resides under the “Access work or school” settings, and it avoids a patch released by Microsoft in February to address an information disclosure flaw tracked as CVE-2021-24084. However, the security investigators discovered recently that the incompletely patched flaw could also be exploited to gain admin rights after publicly disclosing the newly spotted bug in June.

Also, as HiveNightmare/SeriousSAM has taught us, an arbitrary file disclosure can be upgraded to local rights escalation if you know which files to take and what to do with them.”  While Microsoft has most likely also noticed Naceri’s June revealed that the company is yet to patch this LPE flaw, revealing the Windows 10 system with the latest November 2021 security release to attack.

Fortunately, threat actors can only exploit the vulnerability if two very specific conditions have come across:

  • System protection must be enabled on drive C, and at least one restore point created. Whether system protection is enabled or disabled by default depends on various parameters.  
  • At least one local administrator account must be enabled on the computer, or at least one “Administrators” group member’s credentials cached.      

What are the Unofficial Patches for all the affected Windows 10 Systems? 

Until Microsoft releases security updates to address this security issue (likely during next month’s Patch Tuesday), the 0patch micro patching service has released free and unofficial patches for all affected Windows 10 versions (Windows 10 21H2 is also impacted but is not yet supported by the patch):

  • Windows 10 v21H1 (32 & 64 bit) updated with November 2021 Updates
  • Windows 10 v20H2 (32 & 64 bit) updated with November 2021 Updates
  • Windows 10 v2004 (32 & 64 bit) updated with November 2021 Updates
  • Windows 10 v1909 (32 & 64 bit) updated with November 2021 Updates
  • Windows 10 v1903 (32 & 64 bit) updated with November 2021 Updates
  • Windows 10 v1809 (32 & 64 bit) updated with May 2021 Updates

“Windows Servers are not affected, as the vulnerable functionality does not exist there. While some similar diagnostics tools exist on servers, they are being executed under the launching user’s identity, and therefore cannot be exploited.” “Windows 10 v1803 and older Windows 10 versions don’t seem to be affected either. While they do have the ‘Access work or school’ functionality, it behaves differently and cannot be exploited this way. Windows 7 does not have the ‘Access work or school’ functionality at all.”

Advance-Windows-10-Zero-day-Permit-the-Admin-Rights-Gets-Unofficial-Patch-image1

How to install the Micro patch?

To install the unofficial patch on the system, you will need to register an opatch account and install the opatch agent. Once you start the agent on your device, the patch will be applied automatically (if there are no custom patching enterprise policies enabled to block it) without needing a restart.

This is the second Windows zero-day that get a micro patch this month after the security investigators found that the patches for another flaw (CVE-2021-34484) in the Windows User Profile Service could be avoided to escalate privileges on all the Windows versions, even it fully patched.

Microsoft also needs to patch a third zero-day bug in the Microsoft Windows Installer with a proof-of-concept (PoC) exploit released by the security investigators over the weekend. If successfully exploited, the zero-day allows attackers to gain SYSTEM privileges on up-to-date devices running the latest Windows versions, including Windows 10, Windows 11, and Windows Server 2022. Malware creators have since started testing the PoC exploit in low volume attacks likely focused on testing and tweaking it for future full-blown campaigns.      

Leave a Reply