A Windows vulnerability has been discovered that could allow security updates to be rolled back

In order to bypass Windows security features, in particular Driver Signature Enforcement, attackers can downgrade the versions of system kernel components and deploy rootkits in it. Hackers are able to take control of the Windows update mechanism in order to introduce outdated and vulnerable software components onto the updated machine – while the system formally maintains its status up-to-date.

Image source: Ricardo Resende / unsplash.com

The problem was reported by SafeBreach expert Alon Leviev, but Microsoft rejected it, saying that it does not exceed the specified threat level because it allows code to run in the kernel only with administrator privileges. The researcher has developed and published a Windows Downdate tool that allows you to arbitrarily downgrade components and re-open already known vulnerabilities on a seemingly completely updated OS. He managed to bypass the Driver Signature Enforcement (DSE) feature, which allows a hypothetical attacker to download unsigned drivers and deploy a rootkit that disables security controls. In this case, the hacker’s actions will remain unnoticed.

While studying the mechanism of malicious rollback of component versions, Leviev discovered a vulnerability, which was assigned the number CVE-2024-21302. It allows you to escalate user privileges, and Microsoft has closed it. But the Windows Update vulnerability remains relevant. The attack, as demonstrated by the researcher, is carried out by replacing the ci.dll file, responsible for ensuring the operation of DSE, with an older version, which does not require drivers to be signed and allows them to bypass security measures – a vulnerable copy of the library is loaded into memory immediately after Windows begins checking its latest copy. As a result, the system “thinks” it has verified the file and allows unsigned drivers to be loaded into the kernel.

The expert described a method for disabling or bypassing Microsoft Virtualization-based Security (VBS), which creates an isolated environment in Windows to protect important resources. Usually, UEFI and registry configuration changes are blocked for this, but it can be disabled if it does not have maximum security settings – to do this, you need to change one of the keys in the registry. When partially disabled, some VBS files may be replaced by vulnerable versions, opening the door to interference with Windows Update. Mr. Leviev points out that downgrade procedures must be carefully monitored, even if these procedures do not exceed specified threat levels.

admin

Share
Published by
admin

Recent Posts

Windows 11 will become smarter: Microsoft is testing AI file search

Microsoft is testing a new artificial intelligence (AI)-powered search feature in the latest build for…

48 minutes ago

Merger instead of sale: Perplexity AI wants to save TikTok in the US

Perplexity AI proposed on Saturday, a day before TikTok was blocked in the United States,…

48 minutes ago

Battle Shapers – fear of ambition. Review

Not defined Roguelikes with a first-person perspective are a fairly niche genre segment, but they…

6 hours ago

ASRock introduced industrial mini-PCs and motherboards based on Intel Arrow Lake-H and AMD Ryzen 300 AI

ASRock Industrial, according to the CNX-Software resource, presented industrial computers of a small form factor…

7 hours ago

The potential US Secretary of Transportation promised to deal with SpaceX fines and eliminate the space bureaucracy

This week, Congress held confirmation hearings for new ministers nominated by new US President Donald…

8 hours ago

Vast Space has built the world’s first private space station; it will go into orbit this year

California-based startup Vast Space has announced the completion of the world's first commercial space station,…

8 hours ago