Researcher Drops Windows 10 Zero-Day Exploit
#1
Quote:A researcher has made public technical details, a video and proof-of-concept (PoC) exploit code for an unpatched local privilege escalation (LPE) vulnerability affecting Windows.
 
The flaw, disclosed by a researcher who uses the online moniker SandboxEscaper, is related to discretionary access control lists (DACL) and the Task Scheduler, and the exploit has been confirmed to work reliably on a fully patched Windows 10 machine, including 64-bit systems.
 
The vulnerability allows an attacker with limited privileges to change permissions for a specified file by importing a .job file into the Task Scheduler using schtasks.

SecurityWeek has reached out to Microsoft for comment and will update this article if the company responds. Unless in-the-wild exploitation is detected, the company will likely address the flaw with Patch Tuesday updates.

SOURCE: https://www.securityweek.com/researcher-...ay-exploit
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
XYplorer
What's new in Rele...Kool — 06:23
QOwnNotes
26.3.22  Moved the ...Kool — 06:14
Geekbench flags Intel Binary Optimizatio...
Geekbench Browser ...harlan4096 — 07:41
AMD adds GFX1171 and GFX1172 to its “RDN...
AMD RDNA 4m aka RD...harlan4096 — 07:39
Intel introduces Core Ultra Series 3 vPr...
Intel Core Ultra S...harlan4096 — 07:38

[-]
Birthdays
Today's Birthdays
avatar (46)qaqapeti
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>