• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover windows flaws granting hackers rootkit like powers

Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

You are here: Home / General Cyber Security News / Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
April 22, 2024

New investigate has discovered that the DOS-to-NT route conversion approach could be exploited by threat actors to attain rootkit-like capabilities to conceal and impersonate files, directories, and processes.

“When a person executes a functionality that has a route argument in Windows, the DOS path at which the file or folder exists is transformed to an NT route,” SafeBreach security researcher Or Yair explained in an assessment, which was presented at the Black Hat Asia conference past 7 days.

“All through this conversion process, a acknowledged issue exists in which the functionality gets rid of trailing dots from any path aspect and any trailing areas from the very last path aspect. This action is done by most person-room APIs in Windows.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


These so-identified as MagicDot paths make it possible for for rootkit-like performance which is obtainable to any unprivileged consumer, who could then weaponize them to carry out a sequence of destructive steps with no owning admin permissions and remain undetected.

Cybersecurity

They involve the skill to “conceal information and procedures, conceal files in archives, have an effect on prefetch file investigation, make Undertaking Supervisor and Method Explorer consumers feel a malware file was a confirmed executable published by Microsoft, disable Course of action Explorer with a denial of service (DoS) vulnerability, and a lot more.”

Rootkit-Like Powers

The underlying issue inside the DOS-to-NT route conversion procedure has also led to the discovery of four security shortcomings, three of which have given that been resolved by Microsoft –

  • An elevation of privilege (EoP) deletion vulnerability that could be employed to delete files with no the needed privileges (to be preset in a long run launch)
  • An elevation of privilege (EoP) compose vulnerability that could be employed to produce into information without the necessary privileges by tampering with the restoration approach of a previous version from a quantity shadow duplicate (CVE-2023-32054, CVSS score: 7.3), and
  • A distant code execution (RCE) vulnerability that could be applied to make a specially crafted archive, which can lead to code execution when extracting the documents on any spot of the attacker’s selection (CVE-2023-36396, CVSS score: 7.8)
  • A denial-of-assistance (DoS) vulnerability impacting the Approach Explorer when launching a system with an executable whose title is 255 figures extensive and is without a file extension (CVE-2023-42757)

“This exploration is the to start with of its form to explore how known issues that show up to be harmless can be exploited to produce vulnerabilities and, ultimately, pose a significant security risk,” Yair explained.

“We believe that the implications are applicable not only to Microsoft Windows, which is the world’s most extensively utilised desktop OS, but also to all software suppliers, most of whom also allow for regarded issues to persist from edition to edition of their software package.”

Observed this posting intriguing? Stick to us on Twitter  and LinkedIn to study much more exclusive written content we write-up.


Some sections of this post are sourced from:
thehackernews.com

Previous Post: «microsoft warns: north korean hackers turn to ai fueled cyber espionage Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
Next Post: Ransomware Double-Dip: Re-Victimization in Cyber Extortion ransomware double dip: re victimization in cyber extortion»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.