Overview
Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the Advanced Local Procedure Call (ALPC) interface, which can allow a local user to obtain SYSTEM privileges.
Description
The Microsoft Windows task scheduler SchRpcSetSecurity API contains a vulnerability in the handling of ALPC, which can allow an authenticated user to overwrite the contents of a file that should be protected by filesystem ACLs. This can be leveraged to gain SYSTEM privileges. We have confirmed that the public exploit code works on 64-bit Windows 10 and Windows Server 2016 systems. We have also confirmed compatibility with 32-bit Windows 10 with minor modifications to the public exploit code. Compatibility with other Windows versions is possible with further modifications. This vulnerability is being exploited in the wild. |
Impact
An authenticated local user may be able to gain elevated (SYSTEM) privileges. |
Solution
Apply an update |
Deploy Microsoft Sysmon Detection Rules |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.8 | AV:L/AC:L/Au:S/C:C/I:C/A:C |
Temporal | 6.5 | E:F/RL:U/RC:C |
Environmental | 6.4 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8440
- https://github.com/SandboxEscaper/randomrepo/blob/master/PoC-LPE.rar
- https://doublepulsar.com/task-scheduler-alpc-exploit-high-level-analysis-ff08cda6ad4f
- https://msdn.microsoft.com/en-us/library/cc248452.aspx
- https://twitter.com/karsten_nilsen/status/1034406706879578112
- https://www.welivesecurity.com/2018/09/05/powerpool-malware-exploits-zero-day-vulnerability/
Acknowledgements
This issue was publicly disclosed by SandboxEscaper.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2018-8440 |
Date Public: | 2018-08-27 |
Date First Published: | 2018-08-28 |
Date Last Updated: | 2018-09-13 13:05 UTC |
Document Revision: | 68 |