Lucene search

K
zdiTao Yan (@Ga1ois) of Palo Alto NetworksZDI-21-823
HistoryJul 19, 2021 - 12:00 a.m.

(Pwn2Own) Microsoft Windows AppX Deployment Service Race Condition Privilege Escalation Vulnerability

2021-07-1900:00:00
Tao Yan (@Ga1ois) of Palo Alto Networks
www.zerodayinitiative.com
29
microsoft windows
appx deployment service
privilege escalation
vulnerability
local attackers
low-privileged code
lack of validation
user-supplied link
file operations
system context
arbitrary code

EPSS

0.001

Percentile

31.7%

This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AppX Deployment Service. The issue results from the lack of proper validation of a user-supplied link prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.