Monday, April 14, 2025
HomeComputer SecurityHacker Revealed Unpatched Microsoft Windows Privilege Escalation Zero-day Flaw Exploit Online

Hacker Revealed Unpatched Microsoft Windows Privilege Escalation Zero-day Flaw Exploit Online

Published on

SIEM as a Service

Follow Us on Google News

Security Researcher revealed an unpatched Windows Zero-day vulnerability exploit online that discovered in Microsoft Windows Task Scheduler.

This vulnerability discovered and exposed by Belgium security researcher in Twitter under the handle name of “SandboxEscaper“.

https://twitter.com/SandboxEscaper/status/1034125195148255235

- Advertisement - Google News

She mentioned as “Here is the alpc bug as 0day. I don’t f**king care about life anymore. Neither do I ever again want to submit to MSFT anyway. F**k all of this shit.”

It is a local privilege escalation vulnerability in the Microsoft Windows task scheduler in the handling of ALPC(Advanced Local Procedure Call) interface which allows the local user to gain SYSTEM privileges.

Experts from CERT/CC analyze this vulnerability and confirm that the exploit which is released in public works on 64-bit Windows 10 and Windows Server 2016 systems.

A Microsoft spokesperson confirmed that the company recognizes the issue and will “proactively update impacted advice as soon as possible.

The vulnerability note from CERT/CC says: “Theis currently unaware of a practical solution to this problem.”

According to the Tweet that set the hounds running, it’s a zero-day with a proof-of-concept at GitHub. Also, you can see here the complete PoC tutorial for this exploit and how it works in Windows.

So at this time, all Windows users are vulnerable to this local privilege escalation vulnerability and Microsoft scheduled September 11 for next patch Tuesday, so we can expect the fixed in next Microsoft security update.

Also Read: 

Zerodium Pays Upto $1,500,000 Per Fully Functional Zeroday Exploit Submissions

Adobe Issues Patch for Critical Flash Player Zero-day Vulnerability : Its Time to Update

Zero-Day Remote Code Execution Vulnerability Discovered in Microsoft Windows JScript

New Double Zero-day Exploit Discovered in same PDF file that Affected Adobe Acrobat & Windows 7

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral...

Ransomware Group Actively Exploits Windows CLFS Zero-Day Vulnerability

Microsoft has uncovered a sophisticated ransomware campaign exploiting a zero-day vulnerability in the Windows...

Water Gamayun Hackers Exploit MSC EvilTwin Zero-day Vulnerability to Hack Windows Machine

Water Gamayun, a suspected Russian threat actor, has been identified exploiting the MSC EvilTwin...