New Vulnerability in Windows 10 Allows Admin Hijacking
The Windows Registry serves as a configuration store for the Windows operating system and contains hashed passwords, user customizations, configuration options for applications, system decryption keys, and more.
The database files associated with the Windows Registry are stored in the C:Windowssystem32config folder and are divided into different files such as SYSTEM, SECURITY, SAM, DEFAULT, and SOFTWARE.
Because these files contain sensitive information about all user accounts on the device and security tokens used by Windows features, users without elevated privileges will not be able to access them.
This is especially true for Security Account Manager (SAM) because it contains hashed passwords for all users on a system, which threat actors can use to assume their identities.
On July 21, Bleeping Computer quoted security researcher Jonas Lykkegaard as saying that he discovered that the Windows 10 and Windows 11 Registry files associated with SAM, and all Registry databases, can be can access the low-privileged User group on the device.
These low permissions have been confirmed by BleepingComputer on a fully patched Windows 10 20H2 computer, as shown below.
With low-level file permissions, a threat actor with limited privileges on the device can extract NTLM hashed passwords for all accounts on the device and use those hashes in attacks. pass-the-hash public to gain elevated privileges.
Since Registry files, such as SAM files, are always used by the operating system, when you try to access the file, you will get an access violation error because the file is open and locked by another program.
However, according to Lykkegaard, since Registry files, including SAM, are often backed up with Shadows Copy, you can access the file through the Shadow Volume without violating access rights.
For example, threat actors can use the following path for Shadow Volume to access the SAM file from any user on the computer.
?GLOBALROOTDeviceHarddiskVolumeShadowCopy1WindowsSystem32configSAM
According to security researcher Benjamin Delpy, you can easily steal an admin account's NTLM hashed password to gain higher privileges.
In addition to stealing NTLM hashes and privilege upgrades, Delpy said this low-privileged access could enable further attacks, such as Silver Ticket attacks.
It is not clear why Microsoft changed permissions on the Registry to allow ordinary users to read files. However, Will Dormann, a CERT/CC vulnerability analyst, and Jeff McJunkin, author of SANS, say Microsoft introduced these permission changes in Windows 10 1809.
In a security advisory published today, Microsoft confirmed the vulnerability and attached the tracking code CVE-2021-36934.
"We are investigating and will take appropriate action to protect our customers," Microsoft said.
You should read it
- Block access to Registry Editor on Windows 10/8/7
- How to Make and Restore a Backup of the Windows Registry
- How to Get Into a Computer Registry
- Use the .reg file to configure the Registry in WinXP
- 36 best free registry cleaning software 2018
- How to disable Windows Registry on Windows 10
- How to export the Registry key in Windows
- How to fix a corrupted Registry on Windows 10
May be interested
- New zero-day vulnerability warning in Windows Search, Windows protocol nightmare getting worsea new windows search vulnerability can be exploited to automatically open a search window containing remotely hosted malicious executable files just by launching a word document.
- How to set up always opening applications with admin rights on Windows 11similar to other versions of windows, on windows 11, you will sometimes need to launch programs and applications with elevated privileges to perform a certain task as an administrator (admin) of windows. system.
- 'Printer Catastrophe' Vulnerability Threatens All Versions of Windowsalthough microsoft releases patches for windows vulnerabilities on a monthly basis, there are still security issues that remain. recently, the us cybersecurity and infrastructure agency (cisa) reported a critical vulnerability in the windows print spooler system.
- How to launch Admin rights application for User account in Windows?when many people use the same computer, creating multiple user accounts next to the admin account is a good option. the problem is that when using a user account, there are some features that will be limited. however, if you want to grant permission for a certain user right to use as admin but do not want to give admin account password to that person, you can refer to our guide below.
- Detects a vulnerability that threatens all Windows computers shipped from 2012 up to nowsecurity researchers have found a vulnerability in the microsoft windows platform binary table (wpbt). this vulnerability can be exploited by hackers to install rootkits on all windows computers shipped from 2012 to the present.
- What is Session Hijacking? Common Session Hijacking Attackssession hijacking is the act of intentionally taking control of a user's web session.
- What is Windows Admin Center?windows admin center is a locally deployed, browser-based management tool that allows you to manage windows server without depending on azure or the cloud.
- What is Browser Hijacking?browser hijacking occurs when unwanted software on an internet browser changes the behavior of the browser. internet browsers act as windows to the internet. people use them to find information and view or interact with it.
- Instructions on how to activate the Admin account or reset the Admin account passwordin the previous post, network administrator showed you how to activate the hidden admin account on the windows operating system by using the command prompt. in the article below, network administrator will guide you how to activate admin account or reset admin account password by offline method.
- Steps to fix PrintNightmare vulnerability on Windows 10if you've been following recent windows security news, you may have heard of printnightmare. this is a vulnerability that allows hackers to exploit your system and run malicious code on it.