Windows Registry Service Elevation of Privilege Vulnerability
Key Information
- Vendor
- Microsoft
- Status
- Windows 10 Version 1809
- Windows Server 2019
- Windows Server 2019 (server Core Installation)
- Windows Server 2022
- Vendor
- CVE Published:
- 8 October 2024
Badges
Summary
The vulnerability identified as CVE-2024-43532 affects the Windows Registry service, allowing for an elevation of privilege. Exploit code for this vulnerability has been made public, and it enables attackers to take control of a Windows domain by downgrading the security of the authentication process. This flaw affects multiple versions of Windows server software, as well as Windows 10 and 11. Exploiting CVE-2024-43532 could lead to the creation of new domain administrator accounts, and it has been used in a NTLM relay attack by threat actors, including the LockFile ransomware gang. The vulnerability was initially reported to Microsoft in February, with a fix released three months later. The release of a working proof-of-concept and exploitation process demonstrates the potential severity of this vulnerability, highlighting the need for vigilance and mitigation efforts.
Affected Version(s)
Windows 10 Version 1809 < 10.0.17763.6414
Windows Server 2019 < 10.0.17763.6414
Windows Server 2019 (Server Core installation) < 10.0.17763.6414
News Articles
Exploit released for new Windows Server "WinReg" NTLM Relay attack
Proof-of-concept exploit code is now public for a vulnerability in Microsoft's Remote Registry client that could be used to take control of a Windows domain by downgrading the security of the authentication process.
1 month ago
Windows Remote Registry Client EoP Flaw Exposes Systems to Relay Attacks
A critical elevation of privilege (EoP) vulnerability, identified as CVE-2024-43532, has been discovered in the Windows Remote Registry client. This vulnerability potentially allows attackers to relay NTLM authentication and gain unauthorized access to Windows systems.
1 month ago
CVSS V3.1
Timeline
- đź‘ľ
Exploit exists.
First article discovered by CyberSecurityNews
Vulnerability published.
Vulnerability Reserved.