Discover new Zero-Day vulnerabilities that target bugs in Windows 10 Task Scheduler
SandboxEscaper, a vulnerability researcher nicknamed SandboxEscaper, recently quietly announced the emergence of a new zero-exploit feature in the Windows 10 operating system platform, which is less than a week after the operating system This operator receives periodic updates from Microsoft.
This was the fifth exploit in a series of complex exploits aimed at Windows 10, which began to appear at the end of August last year. This time, it has achieved local privilege escalation, giving the author full control over file systems that are only for users with full privileges like SYSTEM and TrustedInstaller.
- Microsoft rushed to release security updates for Windows XP, Server 2003
'Malformed' tasks
Once again, SandboxEscaper focused on Task Scheduler utility and used it to import old tasks from other systems. Basically, Task Scheduler is a utility that owns many useful features for the system, including the ability to automate the necessary tasks or the programs that users want on Windows. At the time of Windows XP, tasks were usually in the .JOB format and they could still be added to newer versions of the operating system.
When this process takes place, Task Scheduler will proceed to import the job file with any DACL control (arbitrary access control list). When no DACL is available, the system will be able to grant any user full access to the file.
- Mysterious hackers offer Windows zero-day vulnerabilities to the world's most dangerous cyber criminals
The researcher explained that this error can be exploited by importing old task files into the Task Scheduler utility on Windows 10. Running a command using 'scht task.exe' and 'calendarsvc.dll' is possible. Copy from the old system, this will lead to a remote procedure call (RPC) to "_SchRpcRegisterTask" - a method of registering the task with the server, presented and processed by the translation Task Scheduler service.
"I assume that to enable the above error, you just need to call directly into this function without having to use scht task.exe copied from windows xp ', SandboxEscaper said.
At the same time, this security researcher also believes that what begins with limited privileges ends with SYSTEM rights when encountering a specific function. To prove the validity of this task, SandboxEscaper shared a video showing that the PoC is operating on Windows x86.
- Detects Zero-Day vulnerabilities on Windows PC operating systems that allow administrative rights
SandboxEscaper also released the exploit on GitHub, and this is said to be a warning to Microsoft. The exploits of this security researcher were previously used in malware, and at the same time the female hacker also said she found 3 more exploits of local privilege escalation on Windows 10, intended to will be released in the near future.
This exploit of SandboxEscaper is now confirmed by Will Dormann, a reputable security vulnerability analyst at the CERT dispatch center.
- Counter-Strike 1.6 features new Zero-Day, allowing malicious servers to hack gamers' computers
With this vulnerability, Microsoft is likely to release patches right away in Patch Tuesday next month or at the latest in July.
You should read it
- IBM developed a new technology to patch security holes
- Microsoft introduced a tool to fix security holes in IE 9 and 10
- 5 common errors in managing security vulnerabilities
- How does the software run automatically on Windows?
- 70% of Microsoft security vulnerabilities stem from memory errors
- 5 ways to open Task Scheduler in Windows 10
- The new zero-day vulnerability on Windows 10 helps hackers take control of the computer
- Microsoft is preparing to release a series of new security holes
May be interested
- How to use Calendo to create an appointment on Windows 10calendo application will help you to make appointments and manage daily scheduled tasks.
- Discover Gmail Taskthe gmail task tool starts testing so that users can control and complete the mountain of work every day.
- Determine whether the system is compromisedin this article we will show you some methods to discover if someone is illegally tampering with your system.
- All problems about using Task Managertask manager is one of the important tools for windows users. task manager has many uses. in this article, tipsmake.com will show you how to use the most basic task manager to take advantage of the benefits that this tool offers.
- Ways to enable Task Manager in Windows 11in windows 11, task manager has received a number of improvements, both in appearance and features. for example, if ever, windows users in general have a habit of launching task manager by right-clicking on the taskbar and selecting the corresponding option.
- Vulnerabilities discovered in many web browsers that allow users to be tracked through installed applicationsinternational security researchers have recently developed a method, or rather, a rather dangerous new vulnerability on many popular web browsers.
- How to Run Windows XP System Maintenance With Automated Scriptsa computer needs a few things done to it on a regular basis to ensure that it continues running smoothly. this guide will show you how to set your windows xp computer to automatically take care of it self using the task scheduler and batch...
- Preparing for a new Task Manager on Windows 11microsoft has just released build 22538 for users to participate in testing windows 11 on the dev channel. in addition to the announced bug fixes and improvements, this update also brings a new task manager that microsoft is temporarily hiding.
- How to Automatically Shut Down Your Computer at a Specified Timethis wikihow teaches you how to configure your mac or pc to safely shut down at a certain time. make sure you save your files frequently so you don't lose data during a shutdown. open the task scheduler app. if you want your scheduled...
- Microsoft patched a critical vulnerability in Windowsyesterday microsoft patched three vulnerabilities in windows, one of which could be exploited by attacks that trick users into accessing malicious websites.