vendor:
Windows 10
by:
Nassim Asrir
9.3
CVSS
HIGH
Local Privilege Escalation
N/A
CWE
Product Name: Windows 10
Affected Version From: Windows 10Pro 1809
Affected Version To: Windows 10Pro 1809
Patch Exists: NO
Related CWE: N/A
CPE: o:microsoft:windows_10
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows
2019
Microsoft Windows 10 – Local Privilege Escalation (UAC Bypass)
I discovered a Local Privilege Escalation in Windows 10 (UAC Bypass), via an auto-elevated process. The executable is changepk.exe. changepk is used to pass a new product key, you can pass the key also via commandline. By executing changepk.exe and tracing the process we can see some RegOpenKey operations that lead to open some non-found Key in the registry (HKCU). In our case we can use "HKCU:SoftwareClassesLauncher.SystemSettingsShellOpenCommand" to spawn our Administrator cmd or to bypass the mmc UAC.
Mitigation:
Ensure that the UAC is enabled and set to the highest level.