Discover new Zero-Day vulnerabilities that target bugs in Windows 10 Task Scheduler
SandboxEscaper, a vulnerability researcher named SandboxEscaper, recently quietly announced the emergence of a new zero-exploit in Windows 10 operating system less than a week after the operating system received it. Get regular updates from Microsoft.
SandboxEscaper, a vulnerability researcher nicknamed SandboxEscaper, recently quietly announced the emergence of a new zero-exploit feature in the Windows 10 operating system platform, which is less than a week after the operating system This operator receives periodic updates from Microsoft.
This was the fifth exploit in a series of complex exploits aimed at Windows 10, which began to appear at the end of August last year. This time, it has achieved local privilege escalation, giving the author full control over file systems that are only for users with full privileges like SYSTEM and TrustedInstaller.
- Microsoft rushed to release security updates for Windows XP, Server 2003
'Malformed' tasks
Once again, SandboxEscaper focused on Task Scheduler utility and used it to import old tasks from other systems. Basically, Task Scheduler is a utility that owns many useful features for the system, including the ability to automate the necessary tasks or the programs that users want on Windows. At the time of Windows XP, tasks were usually in the .JOB format and they could still be added to newer versions of the operating system.
When this process takes place, Task Scheduler will proceed to import the job file with any DACL control (arbitrary access control list). When no DACL is available, the system will be able to grant any user full access to the file.
- Mysterious hackers offer Windows zero-day vulnerabilities to the world's most dangerous cyber criminals
The researcher explained that this error can be exploited by importing old task files into the Task Scheduler utility on Windows 10. Running a command using 'scht task.exe' and 'calendarsvc.dll' is possible. Copy from the old system, this will lead to a remote procedure call (RPC) to "_SchRpcRegisterTask" - a method of registering the task with the server, presented and processed by the translation Task Scheduler service.
"I assume that to enable the above error, you just need to call directly into this function without having to use scht task.exe copied from windows xp ', SandboxEscaper said.
At the same time, this security researcher also believes that what begins with limited privileges ends with SYSTEM rights when encountering a specific function. To prove the validity of this task, SandboxEscaper shared a video showing that the PoC is operating on Windows x86.
- Detects Zero-Day vulnerabilities on Windows PC operating systems that allow administrative rights
SandboxEscaper also released the exploit on GitHub, and this is said to be a warning to Microsoft. The exploits of this security researcher were previously used in malware, and at the same time the female hacker also said she found 3 more exploits of local privilege escalation on Windows 10, intended to will be released in the near future.
This exploit of SandboxEscaper is now confirmed by Will Dormann, a reputable security vulnerability analyst at the CERT dispatch center.
- Counter-Strike 1.6 features new Zero-Day, allowing malicious servers to hack gamers' computers
With this vulnerability, Microsoft is likely to release patches right away in Patch Tuesday next month or at the latest in July.
You should read it
- Hacker revealed the second Zero-Day, broke Windows' EoP vulnerability patch
- How to fix BlueKeep security error for Windows 2003, Windows XP, Windows 7, Windows Server 2008
- IBM developed a new technology to patch security holes
- Microsoft introduced a tool to fix security holes in IE 9 and 10
- 5 common errors in managing security vulnerabilities
- How does the software run automatically on Windows?
- 70% of Microsoft security vulnerabilities stem from memory errors
- 5 ways to open Task Scheduler in Windows 10
- The new zero-day vulnerability on Windows 10 helps hackers take control of the computer
- Microsoft is preparing to release a series of new security holes
- Immediately fix critical vulnerabilities in Windows NTLM security protocol
- Find security holes on every site with Nikto
Maybe you are interested
Do not click on strange links or your phone will be hijacked How to set up or turn off the AutoPlay feature on Windows 11 How to back up and restore the Start menu layout The security hole allows hackers to hack iPhone remotely, update iOS now Signs that your iPhone has been compromised by a hacker The iPhone can be hacked with just one message without requiring user interaction