1 min read

Researcher Releases Updated 0-Day Vulnerability for Windows Systems after Patch Tuesday

Silviu STAHIE

November 23, 2021

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Researcher Releases Updated 0-Day Vulnerability for Windows Systems after Patch Tuesday

A security researcher has released a bypass for a 0-day vulnerability that Microsoft just closed in the latest Patch Tuesday. Ironically, the patch was initially released after a report from the same security researcher.

Companies are usually quick to close 0-day vulnerabilities because they can cause significant harm if exploited by threat actors. Researchers typically follow a 90-day disclosure period, and sometimes longer, giving companies time to fix the problem.

In this situation, Microsoft released a patch for a problem identified by Abdelhamid Naceri, as “Windows Installer Elevation of Privilege Vulnerability” (CVE-2021-41379). While it doesn’t have a high score, meaning that it’s not easily exploitable, it’s still an issue as attackers could delete targeted files on a system.

Soon after the patch for CVE-2021-41379 was released, the same security researcher took a close look and discovered that it’s still possible to exploit a system by making small changes.

“This variant was discovered during the analysis of CVE-2021-41379 patch. the bug was not fixed correctly, however, instead of dropping the bypass,” said Naceri. “I have chosen to actually drop this variant as it is more powerful than the original one.”

“The best workaround available at the time of writing this is to wait for Microsoft to release a security patch, due to the complexity of this vulnerability. Any attempt to patch the binary directly will break windows installer. So you better wait and see how Microsoft will screw the patch again,” he added.

It will be a while until Microsoft issues a new patch for the modified vulnerability, but the company might move a little faster as the researcher also included a proof of concept and the files necessary to replicate the vulnerability on any affected system, which at this point includes Windows 10, Windows 11 and Windows Server.

tags


Author



Right now

Top posts

The Holiday Guide to Tech Support: Fixing the Family Computer

The Holiday Guide to Tech Support: Fixing the Family Computer

November 24, 2021

2 min read
Bitdefender Celebrates 20 Years of Cybersecurity Leadership

Bitdefender Celebrates 20 Years of Cybersecurity Leadership

November 04, 2021

3 min read
Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

October 26, 2021

3 min read
What are drive-by download attacks and how do you prevent them?

What are drive-by download attacks and how do you prevent them?

October 25, 2021

2 min read
Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

October 22, 2021

2 min read
Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

October 20, 2021

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Phishers Targeting Victims with ‘Free’ PCR Test for Omicron COVID-19 Variant Phishers Targeting Victims with ‘Free’ PCR Test for Omicron COVID-19 Variant
Filip TRUȚĂ

December 03, 2021

2 min read
WordPress Plugin Vulnerability Affected More than 80,000 Websites; Patch Is Now Out WordPress Plugin Vulnerability Affected More than 80,000 Websites; Patch Is Now Out
Silviu STAHIE

December 03, 2021

1 min read
Man charged with Ubiquiti data breach and extortion was employee assigned to investigate hack Man charged with Ubiquiti data breach and extortion was employee assigned to investigate hack
Graham CLULEY

December 03, 2021

2 min read