Serious Windows vulnerability exposed, threatening Web3 asset security.

robot
Abstract generation in progress

Microsoft Windows system suffers from serious security vulnerabilities

Last month, Microsoft's security patch included a Windows privilege escalation vulnerability that is being exploited by hackers. This vulnerability mainly affects earlier versions of Windows, while Windows 11 appears to be unaffected. Despite Microsoft's ongoing efforts to strengthen system security measures, attackers may still exploit such vulnerabilities for attacks. This article will analyze the specific details of this vulnerability and potential attack methods.

The analysis process was conducted in a Windows Server 2016 environment.

Numen Exclusive: Microsoft 0day Vulnerability Can Disrupt Web3 Landscape at System and Physical Levels

Vulnerability Background

This is a zero-day vulnerability, which is a system flaw that has not yet been disclosed or patched. Zero-day vulnerabilities tend to be extremely destructive because attackers can exploit them without being detected. Through this Windows system-level vulnerability, hackers can gain complete control of the system.

Compromised systems controlled by hackers can lead to a variety of serious consequences, including but not limited to: theft of personal information, system crashes and data loss, financial losses, and the implantation of malware. For individual users, cryptocurrency private keys may be stolen, putting digital assets at risk of being transferred. From a broader perspective, this vulnerability could even affect the entire Web3 ecosystem based on Web2 infrastructure.

Numen Exclusive: Microsoft's 0day Vulnerability Can Uncover Web3 Landscape at System + Physical Levels

Vulnerability Analysis

After analyzing the patch, it was found that the problem was due to a reference count of an object being handled one extra time. Further research into the early source code comments revealed that the previous code only locked the window object, but did not lock the menu object within the window object, which could lead to incorrect referencing of the menu object.

Numen Exclusive: Microsoft's 0day Vulnerability Can Upend the Web3 Landscape at Both System and Physical Levels

Exploiting Vulnerabilities

We constructed a special multi-layer menu structure to trigger vulnerabilities. These menus have specific ID types and reference relationships to pass through various checks of the system. The key is to remove the reference relationships between specific menus when a certain function returns to the user layer, thereby releasing a critical menu object. In this way, when the system attempts to reference that menu object again, an error will occur.

Numen Exclusive: Microsoft 0day Vulnerability Can Disrupt Web3 Landscape at System + Physical Level

Implementation of Exploit

Exploitation mainly consists of two steps: first, controlling the value of a key parameter, and then using this control to establish stable read/write primitives. We achieved arbitrary read/write access to the system through a carefully designed memory layout, utilizing the specific structure of window objects and window class objects.

Numen Exclusive: Microsoft 0day Vulnerability Can Disrupt Web3 Ecosystem at System and Physical Levels

Numen Exclusive: Microsoft 0day Vulnerability Can Unravel the Web3 Landscape at the System + Physical Level

Numen Exclusive: Microsoft 0day Vulnerability Can Upend Web3 Landscape on System + Physical Levels

Conclusion

  1. Microsoft is attempting to refactor win32k related code using Rust, and future systems may no longer have such vulnerabilities.

  2. The exploitation process of this type of vulnerability is relatively simple, mainly relying on the disclosure of the desktop heap handle address.

  3. The discovery of this vulnerability may be attributed to more advanced code coverage detection techniques.

  4. For vulnerability detection, in addition to focusing on the functions that trigger vulnerabilities, attention should also be paid to abnormal memory layouts and data read/write behaviors.

Overall, although the security of the Windows system is continuously improving, such vulnerabilities in outdated systems still pose a serious security risk. Timely updates of system patches and raising security awareness remain key measures to protect system security.

Numen Exclusive: Microsoft 0day Vulnerability Can Disrupt Web3 Landscape at System + Physical Level

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 6
  • Share
Comment
0/400
GasWastervip
· 07-15 16:57
I have to hurry and update the system again... it's frustrating.
View OriginalReply0
WenAirdropvip
· 07-15 09:00
The new patch didn't have time to install, and the money is gone.
View OriginalReply0
CommunityWorkervip
· 07-15 07:22
Who still dares to use XP? Raise your hand.
View OriginalReply0
OldLeekNewSicklevip
· 07-15 07:19
Move assets to the Cold Wallet for safety first... Don't let the nest be emptied by 0day again.
View OriginalReply0
LiquidityWitchvip
· 07-15 07:15
Now all the coins are gone.
View OriginalReply0
HorizonHuntervip
· 07-15 07:08
Who still dares to use the old version?
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)