Hackers are currently using a new zero-day vulnerability to exploit the Microsoft operating system. With this zero-day vulnerability attacker succeeded in getting administrator privileges on a device pretty much right away. Microsoft Windows 10, Windows 11, and Windows are getting impacted by this zero-day vulnerability.
This zero-day vulnerability is making attackers able to get limited access to get more privileges and spread all over the system to permit additional possible damages. According to a test by BleepingComputer, the exploit has the ability to gain SYSTEM privileges from an account that only possessed conventional privileges.
Furthermore, this latest zero-day vulnerability, spotted by Twitter user Abdelhamid Naceri, was noticed in bypass to a patch that Microsoft previously launched as a reply to CVE-2021-41379. Naceri demonstrated after the patch was launched how the vulnerability can be exploited through ‘InstallerFileTakeOver’ that is a proof-of-concept tool on GitHub.
However, it is tested on Windows 10 21H1 build 19043.1348, according to reports the file took just a couple of seconds to obtain SYSTEM privileges. Apart from this, the company is likely to roll out a security patch to solve the vulnerability for the impacted versions of Windows.
Why the vulnerability was disclosed publicly
According to reports, Naceri stated the zero-day vulnerability openly “out of disappointment over company’s decreasing payouts in its bug bounty program.”
He further noted,
“Microsoft bounties have been smashed since April 2020, I truly wouldn’t do that if MSFT didn’t decide to downgrade those bounties.”