Monday, February 24, 2025
HomeCyber Security NewsWindows 11 Privilege Escalation Vulnerability Lets Attackers Execute Code to Gain Access

Windows 11 Privilege Escalation Vulnerability Lets Attackers Execute Code to Gain Access

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has swiftly addressed a critical security vulnerability affecting Windows 11 (version 23H2), which could allow local attackers to escalate privileges to the SYSTEM level.

Security researcher Alex Birnberg showcased the exploit during the renowned TyphoonPWN 2024 cybersecurity competition, securing third place for his demonstration of the flaw.

TyphoonPWN, one of the premier cybersecurity competitions, brings together security researchers from around the globe to expose vulnerabilities in widely used software.

Alex Birnberg’s successful demonstration of CVE-2024-30085 highlights the importance of such events in uncovering and addressing serious security flaws.

Details of the Vulnerability

The vulnerability, officially tracked as CVE-2024-30085, resides in the Cloud Files Mini Filter Driver (cldflt.sys).

The issue stems from improper validation of user-supplied data when parsing reparse points.

Specifically, the driver fails to validate the size of the data before copying it to a fixed-length heap-based buffer.

By exploiting this, an attacker could leverage the vulnerability to overwrite memory and execute code in the context of System, granting them elevated privileges.

In Windows 11, version 23H2, attackers must first gain the ability to execute low-privileged code on the targeted system to exploit this flaw, significantly escalating the risk in environments where users already have limited system access.

Independent security researchers analyzed the vulnerability in detail, identifying its root cause in the function HsmIBitmapNORMALOpen in the Windows Cloud Files Mini Filter Driver.

The improper handling of reparse point bitmaps allows attackers to bypass crucial checks and introduce malicious data into the system’s memory.

The flaw occurs in scenarios where the length verification of reparse data is skipped under specific conditions during file operations. This improper handling can be exploited to overwrite memory, leading to privilege escalation.

The exploit, demonstrated at TyphoonPWN 2024, involved creating a carefully crafted reparse point to exploit the vulnerable function and achieve SYSTEM-level privileges.

The demonstration earned Alex Birnberg third place in the competition, highlighting the creativity and technical depth of his analysis.

Best Practices:

  • Restrict administrative access to trusted users.
  • Regularly update all Windows systems with the latest patches.
  • Monitor system activity for unusual behavior, especially around file operations and reparse points.
  • Employ intrusion detection systems (IDS) to monitor for signs of exploits.

Organizations should also audit their use of the Cloud Files Mini Filter Driver and ensure that external access to systems requiring elevated privileges is minimized.

This recent discovery underscores the critical importance of proactive cybersecurity practices. Microsoft’s swift response in patching the vulnerability reflects the industry’s commitment to safeguarding users. All affected users should prioritize system updates to ensure their devices remain secure from this and other vulnerabilities.

Following the disclosure by Birnberg, Microsoft promptly released a patch to mitigate the vulnerability. Users are strongly urged to update their systems by applying the latest security update via the official Microsoft Update Guide:

Users are advised to immediately install the recent Windows update, which contains the patch for CVE-2024-30085.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Introduces Quantum-Safe Digital Signatures in Cloud KMS

Google Cloud has unveiled a critical cybersecurity upgrade: quantum-safe digital signatures via its Key Management Service...

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Google Introduces Quantum-Safe Digital Signatures in Cloud KMS

Google Cloud has unveiled a critical cybersecurity upgrade: quantum-safe digital signatures via its Key Management Service...

New Zhong Stealer Malware Exploit Zendesk to Attack Fintech and Cryptocurrency

A newly identified malware, dubbed Zhong Stealer, has emerged as a significant threat to...

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...