Monday, January 27, 2025
HomeCVE/vulnerabilityBYOVDLL - A New Exploit That Is Bypassing LSASS Protection

BYOVDLL – A New Exploit That Is Bypassing LSASS Protection

Published on

SIEM as a Service

Follow Us on Google News

In July 2022, Microsoft patched a well-known PPL bypass flaw, initially discovered by Ionescu and Forshaw. 

This allowed protection circumvention without kernel code execution, and this update now broke the PPLdump PoC.

SCRT Team researchers at Orange Cyberdefense recently discovered a new exploit that enables threat actors to bypass LSASS protection. This new exploit was dubbed “BYOVDLL” (Bring Your Own Vulnerable DLL).

Technical Analysis

However, in October 2022 Gabriel Landau disclosed that the vulnerability remained un-patched through “Bring Your Own Vulnerable DLL” approach and successfully ran PPLdump without any necessary tweaks.

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

This demonstration triggered interest in looking into arbitrary code execution in protected processes by different DLLs, especially not requiring system reboots against Microsoft’s attempted patching efforts.

PPLdump BYOVDLL (Source – SCRT)

Two tiers of Windows system protection, namely Protected Process (PP) and Protected Process Light (PPL), exist with different signers defining a grading or ranking of security.

LSASS, which is a PPL, proves to be a primary focus for in-memory credential extraction since it has a wider attack surface compared to the other high-level PPs.

KeyIso service within LSASS had two serious vulnerabilities:-

Exploiting these required loading vulnerable versions of both keyiso.dll and ncryptprov.dll into LSASS.

This was done through several steps such as changing registry settings to load a vulnerability keyiso.dll, extracting and properly signing the DLL, and then registering a custom Key Storage Provider to load a vulnerable ncryptprov.dll.

Notably, this exploit method bypassed Windows’ security measures without requiring rebooting the system, showing how sensitive the present balance is between making your systems secure while still having exploitable areas.

The successful execution of this exploit highlights persistent difficulties in defending critical system processes against sophisticated attack vectors like those targeting credential theft from seemingly protected processes.

Within the protected LSASS process, the exploit chain was tested successfully by employing vulnerable versions of keyiso.dll and ncryptprov.dll.

To circumvent PPL restrictions, which prevent loading unsigned DLLs, the original LoadLibraryW call was replaced with OutputDebugStringW. 

This change meant instead of relying on Process Monitor to detect filesystem events there could be an execution confirmation through DebugView.

Executing OutputDebugStringW from within LSASS (Source – SCRT)

The steps in exploiting involved restarting KeyIso service and registering a custom Key Storage Provider.

After executing the proof-of-concept code, the debug message “I’m in LSASS!!!” confirmed successful arbitrary code execution in this secure environment.

From BYOVDLL to arbitrary code execution within a protected LSASS process (Source – SCRT)

This demonstration proved that bringing your own vulnerable dll is a valid technique for re-introducing and exploiting patches against high-security vulnerabilities (CVE-2023-36906 and CVE-2023-28229).

Though only displaying a debug message, it also laid the foundation for more sophisticated exploitation techniques within secured processes.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Acces

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...