{"id":18145,"date":"2022-02-02T11:13:00","date_gmt":"2022-02-02T19:13:00","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11878\/"},"modified":"2022-02-02T11:13:00","modified_gmt":"2022-02-02T19:13:00","slug":"news-11878","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11878\/","title":{"rendered":"Apply those updates now: CVE bypass offers up admin privileges for Windows 10"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Tue, 01 Feb 2022 11:07:29 +0000<\/strong><\/p>\n<p>If you\u2019re running Windows 10, it\u2019s time to stop delaying those patches and bring your systems up to date as soon as possible.<\/p>\n<p>Bleeping Computer <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-vulnerability-with-new-public-exploits-lets-you-become-admin\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reports<\/a> that a researcher has come up with a bypass for an older bug, which could serve up some major headaches if left to fester. Those headaches will take the form of unauthorised admin privileges in Windows 10, alongside creating new admin accounts and more besides.<\/p>\n<h2>What happened the first time round?<\/h2>\n<p>Back in 2021, Microsoft patched an exploit which had <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/recently-fixed-windows-zero-day-actively-exploited-since-mid-2020\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">been in use<\/a> since mid-2020. Classed as \u201chigh-severity\u201d, \u201cCVE-2021-1732 &#8211; Windows Win32k Elevation of Privilege Vulnerability\u201d allowed attackers to elevate privileges to admin level.<\/p>\n<p>Fooling potential victims by having them open bogus email attachments is all it would take to get one foot in the door via code execution. It popped up in a <a href=\"https:\/\/ti.dbappsecurity.com.cn\/blog\/articles\/2021\/02\/10\/windows-kernel-zero-day-exploit-is-used-by-bitter-apt-in-targeted-attack\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">targeted attack<\/a> related to the <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/09\/17\/exodus-american-tech-helped-india-spy-on-china\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bitter APT<\/a> campaign. According to the report, numbers were \u201cvery limited\u201d and struck victims in China.<\/p>\n<h2>What\u2019s happening now?<\/h2>\n<p>Multiple exploits have dropped for another elevation of privilege vulnerability known as <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21882\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2022-21882<\/a>. This is a bypass for the previously mentioned <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-1732\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CVE-2021-1732<\/a> which was fixed back in February 2021. CVE-2022-21882 was fixed by Microsoft via updates from January 2022. However, sys admins out there may well have skipped the updates due to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/new-windows-server-updates-cause-dc-boot-loops-break-hyper-v\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">various bugs<\/a> which came along for the update ride.<\/p>\n<h2>Time to get fixing things?<\/h2>\n<p>It is absolutely time to get fixing things. The exploit is now out there in the wild, and as Bleeping Computer notes, it \u201caffects all supported support versions of Windows 10 before the January 2022 Patch Tuesday updates\u201d.&nbsp;<\/p>\n<p>Writers at Bleeping Computer were able to get it to work in testing, and others have confirmed it for themselves:<\/p>\n<figure class=\"wp-block-embed aligncenter is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Interestingly, <a href=\"https:\/\/twitter.com\/hashtag\/MDE?src=hash&amp;ref_src=twsrc%5Etfw\">#MDE<\/a> detects this PoC as CVE-2021-1732. <br \/>This is understandable since this <a href=\"https:\/\/twitter.com\/hashtag\/CVE?src=hash&amp;ref_src=twsrc%5Etfw\">#CVE<\/a>-2022-21882 is a bypass of <a href=\"https:\/\/twitter.com\/hashtag\/CVE?src=hash&amp;ref_src=twsrc%5Etfw\">#CVE<\/a>-2021-1732.<br \/>Generic <a href=\"https:\/\/twitter.com\/hashtag\/LPE?src=hash&amp;ref_src=twsrc%5Etfw\">#LPE<\/a> detection <a href=\"https:\/\/twitter.com\/hashtag\/KQL?src=hash&amp;ref_src=twsrc%5Etfw\">#KQL<\/a> query works in this case too.<a href=\"https:\/\/twitter.com\/hashtag\/BlueTeam?src=hash&amp;ref_src=twsrc%5Etfw\">#BlueTeam<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/ThreatHunting?src=hash&amp;ref_src=twsrc%5Etfw\">#ThreatHunting<\/a><a href=\"https:\/\/t.co\/01El9wPjk0\">https:\/\/t.co\/01El9wPjk0<\/a><br \/>\/1 <a href=\"https:\/\/t.co\/vM2apKJsI6\">https:\/\/t.co\/vM2apKJsI6<\/a><\/p>\n<p>&mdash; Bhabesh (@bh4b3sh) <a href=\"https:\/\/twitter.com\/bh4b3sh\/status\/1487449316117516288?ref_src=twsrc%5Etfw\">January 29, 2022<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<h2>Is there any reason to wait for February\u2019s Patch Tuesday?<\/h2>\n<p>If you\u2019re one of the hold-outs who ran into errors last time around, waiting isn\u2019t advisable. Microsoft already issued an <a href=\"https:\/\/www.theverge.com\/2022\/1\/18\/22889670\/microsoft-windows-server-update-vpn-refs-domain-patch\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">OOB (out of band) update<\/a> to address the multiple errors caused by the January patch. As per Microsoft\u2019s January 17th <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/windows-message-center#2777\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">notification about the release<\/a>:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>&#8220;Microsoft is releasing Out-of-band (OOB) updates today, January 17, 2022, for some versions of Windows. This update addresses issues related to VPN connectivity, Windows Server Domain Controllers restarting, Virtual Machines start failures, and ReFS-formatted removable media failing to mount.&#8221;<\/p>\n<\/blockquote>\n<p>Things being what they are, it\u2019s likely time to get in there and apply the OOB update (if you haven\u2019t already) and put this one to rest.<\/p>\n<p>Microsoft is putting a fair bit of work into figuring out where weak points lie in the patching process, making use of its Update Connectivity data. The <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-it-pro-blog\/achieve-better-patch-compliance-with-update-connectivity-data\/ba-p\/3073356\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">current estimate<\/a> is a device needs a minimum of two continuous connected hours, and six total connected hours after an update is released to reliably make it through the updating process.<\/p>\n<p>If this sounds like your network, and if you\u2019re still waiting to take the plunge, you\u2019ve hopefully got little to lose by making that big update splash as soon as you possibly can.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/02\/apply-those-updates-now-cve-bypass-offers-up-admin-privileges-for-windows-10\/\">Apply those updates now: CVE bypass offers up admin privileges for Windows 10<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/02\/apply-those-updates-now-cve-bypass-offers-up-admin-privileges-for-windows-10\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Tue, 01 Feb 2022 11:07:29 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/02\/apply-those-updates-now-cve-bypass-offers-up-admin-privileges-for-windows-10\/' title='Apply those updates now: CVE bypass offers up admin privileges for Windows 10'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2015\/07\/Windows-10-logo-wmskill.com_.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A CVE bypass offers up the possibility of admin privileges on Windows 10 machines. Find out what&#8217;s happened, and how you can avoid it.<\/p>\n<p>Categories: <a href=\"https:\/\/blog.malwarebytes.com\/category\/malwarebytes-news\/\" rel=\"category tag\">Malwarebytes news<\/a><\/p>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve\/\" rel=\"tag\">CVE<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2022-21882\/\" rel=\"tag\">CVE-2022-21882<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit\/\" rel=\"tag\">exploit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hack\/\" rel=\"tag\">hack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/microsoft\/\" rel=\"tag\">microsoft<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/patch\/\" rel=\"tag\">patch<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phish\/\" rel=\"tag\">phish<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/update\/\" rel=\"tag\">update<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/windows-10\/\" rel=\"tag\">windows 10<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/02\/apply-those-updates-now-cve-bypass-offers-up-admin-privileges-for-windows-10\/' title='Apply those updates now: CVE bypass offers up admin privileges for Windows 10'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2022\/02\/apply-those-updates-now-cve-bypass-offers-up-admin-privileges-for-windows-10\/\">Apply those updates now: CVE bypass offers up admin privileges for Windows 10<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11810,24763,11638,4980,10546,10516,14244,10511,11304,10761],"class_list":["post-18145","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve","tag-cve-2022-21882","tag-exploit","tag-hack","tag-malwarebytes-news","tag-microsoft","tag-patch","tag-phish","tag-update","tag-windows-10"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18145"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18145\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}