SoylentNews
SoylentNews is people
https://soylentnews.org/

Title    Windows PsExec Zero-Day Vulnerability Gets a Free Micropatch
Date    Monday January 11 2021, @12:56PM
Author    Fnord666
Topic   
from the get-your-free-patches-while-they-last! dept.
https://soylentnews.org/article.pl?sid=21/01/10/2034228

upstart writes in with an IRC submission:

Windows PsExec zero-day vulnerability gets a free micropatch:

A free micropatch fixing a local privilege escalation (LPE) vulnerability in Microsoft's Windows PsExec management tool is now available through the 0patch platform.

PsExec is a fully interactive telnet-replacement that allows system admins to execute programs on remote systems. PsExec tool is also integrated into and used by enterprise tools to remotely launch executables on other computers.

This PsExec zero-day is caused by a named pipe hijacking (also known as named pipe squatting) vulnerability which allows attackers to trick PsExec into re-opening a maliciously created named pipe and giving it Local System permissions.

After successfully exploiting the bug, threat actors will be able to execute arbitrary processes as Local System which effectively allows them to take over the machine.

[...] "This vulnerability allows an attacker who can already run code on your remote computer as a non-admin (e.g., by logging in as a regular Terminal Server user, or establishing an RDP session as a domain user, or breaking into a vulnerable unprivileged service running on the remote computer) to elevate their privileges to Local System and completely take over the machine as soon as anyone uses PsExec against that machine," Kolsek said.

"For home users and small businesses, this is probably not a high-priority threat, while for large organizations it may be."


Original Submission

Links

  1. "upstart" - https://soylentnews.org/~upstart/
  2. "Windows PsExec zero-day vulnerability gets a free micropatch" - https://www.bleepingcomputer.com/news/security/windows-psexec-zero-day-vulnerability-gets-a-free-micropatch/
  3. "PsExec" - https://docs.microsoft.com/en-us/sysinternals/downloads/psexec
  4. "named pipe" - https://docs.microsoft.com/en-us/windows/win32/ipc/named-pipes
  5. "Original Submission" - https://soylentnews.org/submit.pl?op=viewsub&subid=46639

© Copyright 2024 - SoylentNews, All Rights Reserved

printed from SoylentNews, Windows PsExec Zero-Day Vulnerability Gets a Free Micropatch on 2024-04-19 20:18:54