During the late August Patch Tuesday Microsoft uncompletely patched a zero-day bug that goes by the identification CVE-2021-34484. The company only fixed the impact of the proof-of-concept (PoC). Earlier security researcher Abdelhamid Naceri made a report on the issue. This uncompletely patched bug affects all Windows versions, including Windows 10, Windows 11, and Windows Server 2022. In the Windows User Profile Service it allows potential attackers to gain SYSTEM privileges under certain conditions.
Abdelhamid Naceri discovered lately that attackers could still bypass the Microsoft patch to elevate privileges to gain SYSTEM privileges under certain conditions, getting an elevated command prompt while the User Account Control (UAC) prompt displays itself. CERT/CC vulnerability analyst Will Dormann then checked the CVE-2021-34484 bypass PoC exploit. He discovered that it would not always create the elevated command prompt.
However, cyber security specialists point out that the bug won’t likely be exploited as it requires attackers to know and log in with other users’ credentials for exploiting the vulnerability. Microsoft acknowledged the existing problem and “will take appropriate action to keep customers protected.” Whilst the company is working on the problem, the 0patch micropatching service has released Thursday a free unofficial patch ( also known as a micropatch).
“While this vulnerability already has its CVE ID (CVE-2021-33742), we’re considering it to be without an official vendor fix and therefore a 0day,” 0patch co-founder Mitja Kolsek says. “Micropatches for this vulnerability will be free until Microsoft has issued an official fix.”
In order to use the free patch you will first need to register a 0patch account and then begin the installation process of the 0patch agent. Once the installation finishes itself, the micropatch will be applied automatically (if there is no custom patching enterprise policy in place blocking it). You won`t need to reboot your device.
The users of the following Windows versions can apply this free patch to block attacks using the CVE-2021-34484 bypass:
Besides, recently Google released an emergency update for Chrome browser. Since cyber security specialist found two actively exploited zero-day vulnerabilities. Identified as CVE-2021-38000 and CVE-2021-38003 the exploits allowed for inappropriate implementation in V8 JavaScript and WebAssembly engine and insufficient validation of untrusted input in a feature called Intents as well.
About News-bpudepi.today News-bpudepi.today pop-ups can not launch out of the blue. If you have actually…
About Doguhtam.xyz Doguhtam.xyz pop-ups can not expose out of nowhere. If you have clicked some…
About News-xlixoti.com News-xlixoti.com pop-ups can not introduce out of nowhere. If you have actually clicked…
About Ducesousightion.com Ducesousightion.com pop-ups can not introduce out of the blue. If you have actually…
About News-xlabica.live News-xlabica.live pop-ups can not launch out of the blue. If you have actually…
About Mergechain.co.in Mergechain.co.in pop-ups can not expose out of the blue. If you have clicked…