Thursday, April 24, 2025
HomeCVE/vulnerabilityMicrosoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

Published on

SIEM as a Service

Follow Us on Google News

A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat to IT administrators and developers worldwide.

The vulnerability enables attackers to exploit DLL injection techniques to execute malicious code, putting systems at risk of compromise.

Despite being disclosed to Microsoft over 90 days ago, the issue remains unresolved, leaving users reliant on manual mitigations to safeguard their environments.

- Advertisement - Google News

Microsoft Sysinternals is a widely used suite of tools designed for system analysis, troubleshooting, and malware investigation. 

Popular utilities, such as Process ExplorerAutoruns, and Bginfo, are integral to system administrators for monitoring processes, configurations, and services.

However, unlike many Windows components that receive regular updates through the Windows Update infrastructure, Sysinternals tools require manual updates.

This lack of integration creates a significant window of risk when vulnerabilities, such as this one, are discovered.

Details of the Vulnerability

According to the Cyber Security News report, the vulnerability arises from how Sysinternals tools handle dynamic-link library (DLL) file loading.

These tools prioritize untrusted paths—such as the current working directory (CWD) or network paths—over safe, system-designated directories.

This allows attackers to stage malicious DLLs in the same location as a legitimate Sysinternals executable.

How the Exploit Works:

  1. Crafting a Malicious DLL: An attacker creates a DLL (e.g., cryptbase.dll or TextShaping.dll) embedded with malicious payloads.
  2. File Placement: The DLL is placed alongside a legitimate Sysinternals executable (e.g., Bginfo.exe).
  3. Execution: When the targeted application is executed, it loads the malicious DLL instead of the trusted one.
  4. Result: The attacker’s code runs with the user’s system privileges, potentially leading to full system compromise.

Real-World Application: Bginfo Trojan Deployment

One of the most glaring examples of exploitation involves the Bginfo tool, used in enterprise environments to display desktop system information.

In a simulated scenario, an attacker places a malicious DLL on a shared network directory. During system startup, a script executes Bginfo.exe directly from the network path.

The tool, in turn, loads the malicious DLL instead of the legitimate one, enabling the proliferation of malware like Trojans or backdoors across multiple systems. A technical writeup by the researcher cautions:

“If the network path contains a prepared DLL, each client can be automatically compromised during the startup process.”

The vulnerability was responsibly disclosed to Microsoft on October 28, 2024, in line with industry best practices.

However, Microsoft classified the issue as a “defense-in-depth” enhancement, meaning it does not consider the vulnerability a critical flaw but rather an issue to be addressed via secure usage practices.

Microsoft’s stance emphasizes running Sysinternals tools from local directories rather than network locations.

The researcher, however, argues this approach overlooks real-world scenarios where tools are executed directly from shared directories. As of February 2025, the vulnerability remains unpatched, exposing organizations to significant risk.

Sysinternals tools are indispensable for IT administration and malware analysis, yet this vulnerability highlights their inherent risks.

While trusted for identifying malicious behavior on systems, these tools now face scrutiny for enabling DLL injection attacks themselves. Until Microsoft addresses the issue, users must remain vigilant and proactive in securing their environments.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...

GitLab Releases Critical Patch for XSS, DoS, and Account Takeover Bugs

GitLab, a leading DevOps platform, has released a critical security patch impacting both its...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...