A security researcher recently revealed technical details for a zero-day privilege elevation vulnerability in Windows and also a public proof-of-concept (PoC) exploit that provides SYSTEM access under certain settings.
As explained by Cezarina, a zero-day exploit refers to the method used by attackers to infiltrate and deploy the malware into a system.
A public proof-of-concept (PoC) attack has been released, along with technical details, for an unpatched Windows zero-day privilege elevation vulnerability that allows users to gain SYSTEM access under certain circumstances.
Fortunately, it seems that in order to exploit the vulnerability take a threat actor must know another person’s user name and password, therefore it is unlikely to be extensively exploited.
This specific vulnerability affects all versions of Windows, including Windows 10, Windows 11, and Windows Server 2022.
A bypass was released to patched vulnerability Microsoft released a security update for a “Windows User Profile Service Elevation of Privilege Vulnerability”. The flaw is tracked as CVE-2021-34484 and it was discovered by security researcher Abdelhamid Naceri.
CVE-2021-34484 bypass as 0dayhttps://t.co/W0gnYHxJ6B
— Abdelhamid Naceri (@KLINIX5) October 22, 2021
As reported by BleepingComputer, after examining the patch, the researcher discovered that it was not sufficient and that he was able to bypass it with a new exploit that