New Windows Zero-Day grants local administrator access

It seems like there is a new local zero-day exploit called the admin under Windows privileges almost every day, and this is no exception today. A researcher has publicly disclosed a vulnerability that allows anyone with standard permissions to open a command prompt with SYSTEM level access.

This vulnerability allows threat actors to go through the elevated command prompt to elevate their privileges and grant far more access than they should have. Someone can access a system that is running Windows 10, Windows 11, and Windows Server 2022.

The exploit was discovered by researcher Abdelhamid Naceri and published on GitHub. To check the problem, BleepingComputer tested it on a Windows PC with Windows 10 21H1 Build 19043.1348 and found that it “took only a few seconds to get SYSTEM permissions from a test account with ‘Standard’ permissions”.

When BleepingComputer asked why he decided to publicly disclose the vulnerability instead of reporting it to Microsoft’s bug bounty program, he named massively lower payouts for reporting problems. “Microsoft bounties have been discarded since April 2020, I really wouldn’t be doing that if MSFT hadn’t made the decision to downgrade those bounties,” said Naceri.

Since this is a local exploit, the person would have to have personal access to your computer. However, as mentioned earlier, it only takes a few seconds for them to gain elevated access so they don’t have to be in possession for long. This is an issue to watch out for and be sure to download the patch as soon as Microsoft makes one available.

SteelSeries software bug gives Windows 10 admin rights

Related Posts