Keyhole – Forge own Windows Store licenses
A newly discovered exploit named "Keyhole" allows bypassing Microsoft's Client Licensing Platform, enabling unauthorized license creation for Microsoft products. Researchers shared their findings after Cisco TALOS reported the vulnerability.
Read original articleThe blog post discusses a newly discovered exploit named "Keyhole," which allows users to bypass Microsoft's Client Licensing Platform (CLiP) and activate any Microsoft Store app or Windows edition. The researchers found that a valid ECDSA key for signing XML licenses is stored in an unobfuscated form within the clipup.exe binary, enabling unauthorized license creation. By manipulating license blocks, they discovered that data placed after the signature block is not checked, allowing them to override existing license data. This exploit effectively undermines CLiP's DRM system, enabling the creation of licenses for various Microsoft products, including Windows itself. The researchers initially celebrated their findings but later learned that Cisco TALOS had reported the same vulnerability to Microsoft, categorizing it as a "privilege escalation." The researchers expressed disappointment over the lack of recognition for their work and the subsequent patch that would close the exploit. They have since released their findings and tools for others to explore CLiP further.
- The "Keyhole" exploit allows bypassing Microsoft's CLiP for unauthorized license creation.
- A valid ECDSA key in clipup.exe enables signing of XML licenses.
- License blocks can be manipulated by placing data after the signature block, overriding previous data.
- Cisco TALOS reported the vulnerability to Microsoft, leading to a patch that closes the exploit.
- The researchers have shared their findings and tools for further exploration of CLiP.
Related
EU gave CrowdStrike the keys to the Windows kernel, claims Microsoft
Microsoft raised concerns about EU granting CrowdStrike access to Windows kernel in 2009. Third-party software's deep integration in the system architecture is questioned, highlighting risks of disruptions. Microsoft's response to CrowdStrike chaos is pending.
EU gave CrowdStrike keys to Windows kernel, Microsoft claims
Microsoft claims EU granted CrowdStrike access to Windows kernel in 2009 for interoperability. Concerns arise over third-party software's deep integration. Microsoft not blamed for recent chaos caused by CrowdStrike update.
Hackers bypass Windows SmartScreen flaw to launch malware
Cybercriminals are exploiting a Microsoft Defender vulnerability (CVE-2024-21412) to install malware undetected. Many systems remain unpatched, making them vulnerable. Users should update Windows and be cautious with email attachments.
The Wild West of Proof of Concept Exploit Code (PoC)
CVE-2024-6387 is a serious unauthenticated remote code execution vulnerability in OpenSSH, with complex exploitation requiring knowledge of system architecture. The exploit code contains malicious elements, emphasizing risks of untrusted code.
Secure Boot useless on PCs from major vendors after key leak
A study by Binarily found that hundreds of PCs from major manufacturers are vulnerable due to a leaked 12-year-old test platform key, allowing attackers to bypass Secure Boot protections.
- Many users express interest in using the exploit to access games and applications for free, particularly Xbox games and specific Windows apps.
- Concerns are raised about the potential for Microsoft to quickly patch the exploit, limiting its effectiveness.
- Some commenters discuss the broader implications of Microsoft's licensing practices and DRM strategies, questioning their impact on user security.
- There are mentions of previous methods for bypassing licensing checks, indicating a history of similar exploits.
- Criticism of the article's professionalism and the manner in which the exploit was reported is noted.
(¥) you might have to figure out some details
From my understanding, if you have the license, then you can still download it but it's not available for new users.
The double irony is that, even if it works, I may not be able to read my own game-saves since the Console's own public key is on the revocation list. I could sidestep this by resigning the CON files with the default value, 0.
The triple irony may be forthcoming yet. this all looks very familiar indeed.
fuckin brilliant
Oh and by the way Pluton is now on the latest batch of Intel laptop chips. And has been on AMDs for a while. How soon until Windows requires it?
Amazing.
I guess the method described here does „more“ since it’s much more elaborate. Not super familiar with the different levels of win licences
highly suspicious
Bit gross to be honest
Related
EU gave CrowdStrike the keys to the Windows kernel, claims Microsoft
Microsoft raised concerns about EU granting CrowdStrike access to Windows kernel in 2009. Third-party software's deep integration in the system architecture is questioned, highlighting risks of disruptions. Microsoft's response to CrowdStrike chaos is pending.
EU gave CrowdStrike keys to Windows kernel, Microsoft claims
Microsoft claims EU granted CrowdStrike access to Windows kernel in 2009 for interoperability. Concerns arise over third-party software's deep integration. Microsoft not blamed for recent chaos caused by CrowdStrike update.
Hackers bypass Windows SmartScreen flaw to launch malware
Cybercriminals are exploiting a Microsoft Defender vulnerability (CVE-2024-21412) to install malware undetected. Many systems remain unpatched, making them vulnerable. Users should update Windows and be cautious with email attachments.
The Wild West of Proof of Concept Exploit Code (PoC)
CVE-2024-6387 is a serious unauthenticated remote code execution vulnerability in OpenSSH, with complex exploitation requiring knowledge of system architecture. The exploit code contains malicious elements, emphasizing risks of untrusted code.
Secure Boot useless on PCs from major vendors after key leak
A study by Binarily found that hundreds of PCs from major manufacturers are vulnerable due to a leaked 12-year-old test platform key, allowing attackers to bypass Secure Boot protections.