Easy Zero-day privilege escalation exploit for Windows released because Microsoft is stingy

Reading time icon 2 min. read


Readers help support MSpoweruser. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help MSPoweruser sustain the editorial team Read more

Microsoft

A security researcher has released a very simple privilege escalation exploit for all supported versions of Windows because Microsoft has been cutting the amount it has been awarding for bug bounties.

Abdelhamid Naceri told Bleeping Computer that he was frustrated over Microsoft’s decreasing payouts in their bug bounty program.

“Microsoft bounties has been trashed since April 2020, I really wouldn’t do that if MSFT didn’t take the decision to downgrade those bounties,” explained Naceri.

Other researchers agreed, saying:

https://twitter.com/MalwareTechBlog/status/1287848085243060224?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1287848085243060224%7Ctwgr%5E%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fmicrosoft%2Fnew-windows-zero-day-with-public-exploit-lets-you-become-an-admin%2F

Naceri’s exploit easily elevates a regular user to System privileges, as can be seen in BleepingComputer’s video below:

The hack was developed based on a Microsoft patch for an earlier exploit which Naceri said was incomplete.

“This variant was discovered during the analysis of CVE-2021-41379 patch. the bug was not fixed correctly, however, instead of dropping the bypass,” explains Naceri in his writeup. “I have chosen to actually drop this variant as it is more powerful than the original one.”

The ‘InstallerFileTakeOver’ exploit works on Windows 10, Windows 11, and Windows Server and can be chained with other exploits to fully take over a computer network.

Microsoft has yet to respond to the release.

More about the topics: microsoft, security

Leave a Reply

Your email address will not be published. Required fields are marked *