Lucene search

K
thnThe Hacker NewsTHN:BF8D1CDD86B8A08C2D931365180CE72E
HistoryAug 08, 2024 - 10:05 a.m.

Windows Downgrade Attack Risks Exposing Patched Systems to Old Vulnerabilities

2024-08-0810:05:00
The Hacker News
thehackernews.com
22
windows
downgrade
attack
risks
exposing
patched
systems
vulnerabilities
microsoft
updates
privilege
escalation
system
file
replacement
safebreach
labs
researcher
black hat
usa
def con
windows downdate
tool
manipulates
update
undetectable
critical
os
components
zero-days
fully patched
meaningless
dlls
drivers
nt kernel

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

18.3%

Windows Downgrade Attack

Microsoft said it is developing security updates to address two loopholes that it said could be abused to stage downgrade attacks against the Windows update architecture and replace current versions of the operating system files with older versions.

The vulnerabilities are listed below -

  • CVE-2024-38202 (CVSS score: 7.3) - Windows Update Stack Elevation of Privilege Vulnerability
  • CVE-2024-21302 (CVSS score: 6.7) - Windows Secure Kernel Mode Elevation of Privilege Vulnerability

Credited with discovering and reporting the flaws is SafeBreach Labs researcher Alon Leviev, who presented the findings at Black Hat USA 2024 and DEF CON 32.

Cybersecurity

CVE-2024-38202, which is rooted in the Windows Backup component, allows an โ€œattacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS),โ€ the tech giant said.

It, however, noted that an attacker attempting to leverage the flaw would have to convince an Administrator or a user with delegated permissions to perform a system restore which inadvertently triggers the vulnerability.

The second vulnerability also concerns a case of privilege escalation in Windows systems that support VBS, effectively allowing an adversary to replace current versions of Windows system files with outdated versions.

The consequences of CVE-2024-21302 are that it could be weaponized to reintroduce previously addressed security flaws, bypass some features of VBS, and exfiltrate data protected by VBS.

Windows Downgrade Attack

Leviev, who detailed a tool dubbed Windows Downdate, said it could be used to turn a โ€œfully patched Windows machine susceptible to thousands of past vulnerabilities, turning fixed vulnerabilities into zero-days and making the term โ€˜fully patchedโ€™ meaningless on any Windows machine in the world.โ€

The tool, Leviev added, could โ€œtake over the Windows Update process to craft fully undetectable, invisible, persistent, and irreversible downgrades on critical OS componentsโ€”that allowed me to elevate privileges and bypass security features.โ€

Furthermore, Windows Downdate is capable of bypassing verification steps, such as integrity verification and Trusted Installer enforcement, effectively making it possible to downgrade critical operating system components, including dynamic link libraries (DLLs), drivers, and NT kernel.

Cybersecurity

The issues, on top of that, could be exploited to downgrade Credential Guardโ€™s Isolated User Mode Process, Secure Kernel, and Hyper-Vโ€™s hypervisor to expose past privilege escalation vulnerabilities, as well as disable VBS, alongside features like Hypervisor-Protected Code integrity (HVCI).

The net result is that a completely patched Windows system could be rendered susceptible to thousands of past vulnerabilities and turn fixed shortcomings into zero-days.

These downgrades have an added impact in that the operating system reports that the system is fully updated, while simultaneously preventing the installation of future updates and inhibiting detection by recovery and scanning tools.

โ€œThe downgrade attack I was able to achieve on the virtualization stack within Windows was possible due to a design flaw that permitted less privileged virtual trust levels/rings to update components residing in more privileged virtual trust levels/rings,โ€ Leviev said.

โ€œThis was very surprising, given Microsoftโ€™s VBS features were announced in 2015, meaning the downgrade attack surface I discovered has existed for almost a decade.โ€

Found this article interesting? Follow us on Twitter ๏‚™ and LinkedIn to read more exclusive content we post.

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.001

Percentile

18.3%