vendor:
Windows Kernel API
by:
Moti
7,2
CVSS
HIGH
Privilege Escalation
264
CWE
Product Name: Windows Kernel API
Affected Version From: Windows Vista/2008 6.1.6000 x32
Affected Version To: Windows 7/2008 R2 6.2.7600 x64
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2009
A Design Flaw in Windows Kernel API can Lead to privilege escalation
A design flaw in Windows Kernel API can lead to privilege escalation. After running the PoC, typing “whoami” in command prompt will show the escalated user credentials. All actions this PoC performs require only user privilege, but result in arbitrary kernel mode code execution due to the ambiguous design of RtlQueryRegistryValues. This design flaw exists in most versions of Windows kernels, yet no patch or documentation is publicly available on this issue.
Mitigation:
No patch or documentation is publicly available on this issue.