Categories: Security

Google discloses a Zero-Day Windows 8.1 flaw

Google Project Zero team has disclosed the details of an unpatched flaw affecting Windows 8.1 systems and reported to Microsoft in September.

The experts at the Google Project Zero team have ethically disclosed the details of an unpatched Windows 8.1 vulnerability reported to Microsoft in September. The team has waited for 90 days before publicly disclose the details of the flaw in compliance with its disclosure policy.

“This bug is subject to a 90 day disclosure deadline. If 90 days elapse without a broadly available patch, then the bug report will automatically become visible to the public.”

Unfortunately, Microsoft still hasn’t issued a patch for the Windows 8.1 flaw that could be exploited by an attacker to elevate his privileges on a target machine to gain administrator access. Security experts believe that Microsoft will release a fix in the next set of Patch Tuesday security bulletins, which are scheduled for Jan. 13.

Windows 8 1Windows 8 1

In order to exploit the vulnerability, the attackers need valid logon credentials to use locally.

According the Google researcher James Forshaw, the flaw affects the NtApphelpCacheControl system call that is used by Windows 8.1 systems for quick caching of application data. According to researchers, the system doesn’t validate correctly the user’s impersonation token, in particular it is not able to manage his privileges.

“It reads the caller’s impersonation token using PsReferenceImpersonationToken and then does a comparison between the user SID in the token to LocalSystem’s SID. It doesn’t check the impersonation level of the token so it’s possible to get an identify token on your thread from a local system process and bypass this check,” Forshaw wrote in an advisory on the Google vulnerability database. “For this purpose the PoC abuses the BITS service and COM to get the impersonation token but there are probably other ways.”

Forshaw explained that he wasn’t sure that the vulnerability affects also Windows 7 systems, he provided a proof-of-concept exploit code was tested only on Windows 8.1 update, on both 32- and 64-bit versions.

It’s unclear if Windows 7 is vulnerable as the code path for update has a TCB privilege check on it (although it looks like depending on the flags this might be bypassable). No effort has been made to verify it on Windows 7. NOTE: This is not a bug in UAC, it is just using UAC auto elevation for demonstration purposes.” states the advisory.

Below the steps to follow to exploit the vulnerability on Windows 8.1 systems:

1) Put the AppCompatCache.exe and Testdll.dll on disk 2) Ensure that UAC is enabled, the current user is a

2) Ensure that UAC is enabled, the current user is a split-token admin and the UAC setting is the default (no prompt for specific executables).

3) Execute AppCompatCache from the command prompt with the command line “AppCompatCache.exe c:\windows\system32\ComputerDefaults.exe testdll.dll”.

4) If successful then the calculator should appear running as an administrator. If it doesn’t work first time (and you get the ComputerDefaults program) re-run the exploit from 3, there seems to be a caching/timing issue sometimes on first run.

The PoC for the Windows 8.1 vulnerability is available at the following URL:

https://google-security-research.googlecode.com/issues/attachment?aid=1180000000&name=poc.zip&token=ABZ6GAcinCdBWFbys57rfNuyqfh9ME1_ug%3A1420225192253

The “Project Zero” started by Google involves a team of Star Hackers and Bug Hunters with the purpose to improve security of the Internet. Google hired a team of top security researchers that work to discover most severe security vulnerabilities in applications and services around the world and to fix them.

Pierluigi Paganini

(Security Affairs –  Windows 8.1, Google Project Zero)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

New PumaBot targets Linux IoT surveillance devices

PumaBot targets Linux IoT devices, using SSH brute-force attacks to steal credentials, spread malware, and…

3 hours ago

App Store Security: Apple stops $2B in fraud in 2024 alone, $9B over 5 years

Apple blocked over $9B in fraud in 5 years, including $2B in 2024, stopping scams…

4 hours ago

Crooks use a fake antivirus site to spread Venom RAT and a mix of malware

Researchers found a fake Bitdefender site spreading the Venom RAT by tricking users into downloading…

8 hours ago

Iranian Man pleaded guilty to role in Robbinhood Ransomware attacks<gwmw style="display:none;"></gwmw>

Iranian man pleads guilty to role in Baltimore ransomware attack tied to Robbinhood, admitting to…

9 hours ago

DragonForce operator chained SimpleHelp flaws to target an MSP and its customers

Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a…

19 hours ago

Russia-linked APT Laundry Bear linked to 2024 Dutch Police attack

A new Russia-linked APT group, tracked as Laundry Bear, has been linked to a Dutch…

1 day ago