Skip to content
May 19, 2025
  • Linkedin
  • Twitter
  • Facebook
  • Youtube

Daily CyberSecurity

Primary Menu
  • Home
  • Cyber Security
  • Cybercriminals
  • Data Leak
  • Linux
  • Malware Attack
  • Open Source Tool
  • Technology
  • Vulnerability
  • Home
  • News
  • Vulnerability
  • Google Project Zero team found a Windows zero-day vulnerability
  • Vulnerability

Google Project Zero team found a Windows zero-day vulnerability

Ddos April 25, 2018 2 min read
Windows zero-day vulnerability

Google’s Project Zero team recently discovered a zero-day vulnerability in the Windows 10 operating system that could bypass Windows’s locking strategy and execute relevant code. The vulnerability has not been fixed yet. Google team researchers have enabled UMCI authentication on a Windows 10s system computer. A .NET vulnerability can bypass the Windows locking policy of examining COM library instances. Researchers believe that this flaw will not only affect Windows 10s but also other versions of the Windows 10 operating system will be affected.

The problem arises from the locking policy response of the WLDP COM library caused by the loading of a .NET COM object. Under normal circumstances, the locking strategy contains a list of 8 to 50 fixed-writing COM objects that can only be loaded by the heuristic script engine. Even if you can use a trusted COM CLSID to register an existing dynamic link library (DLL), you still need to check the CLSID in DLLGetObject against the list written in advance to ensure security. The current vulnerability is that as long as a .NET COM object is loaded, the CLSID in DLLGetObject only needs to look up the HKEY_CLASS_ROOT (HKCR) registration information in the system registry, and then the CLSID is no longer needed. A .NET COM object is created. So a hacker can add registry values, including creating a new HKEY_CURRENT_USER (HKCU) value and loading a special COM class under a CLSID.

Hackers can use a free DotNetToJScript scripting tool like that produced by Forshaw to generate a .NET code that boots JScript. He also released two files: an .INF file to set the registry, and an .SCT file to verify the vulnerability in system memory. Load untrusted .NET code, pop up a message window.

The vulnerability was reported to Microsoft on January 19th this year. However, after the 90-day patch period, Microsoft failed to fix the vulnerability and did not announce a specific repair schedule. Fortunately, this flaw is not large, and even if it is announced, it will not have a big impact. Currently, only the Device Guard function is enabled in the Windows 10s system will be affected, and it cannot be remotely attacked, nor does it have the function of privilege escalation.

Source: securityaffairs

Rate this post

Found this helpful?

If this article helped you, please share it with others who might benefit.

Tags: Windows zero-day vulnerability

Continue Reading

Previous: Reseacher publish a tool that can jailbreak Nintendo Switch
Next: Hacker stole $13,000 in Ethereum during two hours by hijacking DNS Server of MyEtherWallet

Search

💙 Support Us!
We need 50 contributors this month to keep this site running.
10 of 50 supporters this month
☕ Buy Me a Coffee PayPalDonate
Our Websites
  • Penetration Testing Tools
  • The Daily Information Technology
    • About SecurityOnline.info
    • Advertise on SecurityOnline.info
    • Contact

    When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works

    • Disclaimer
    • Privacy Policy
    • DMCA NOTICE
    • Linkedin
    • Twitter
    • Facebook
    • Youtube
    Copyright © All rights reserved.
    x