September 12th, 2024

About that Windows Installer 'make me admin' security hole. How it's exploited

Microsoft patched a critical Windows Installer vulnerability, CVE-2024-38014, allowing privilege escalation. SEC Consult released a tool to identify vulnerable files, urging users to apply the patch promptly.

Read original articleLink Icon
About that Windows Installer 'make me admin' security hole. How it's exploited

Microsoft has addressed a significant security vulnerability in Windows Installer, identified as CVE-2024-38014, which allows malware or unauthorized users to gain SYSTEM-level privileges on a PC. This flaw was discovered by SEC Consult and has been actively exploited. The vulnerability arises when a low-privileged user attempts to repair an application using an Installer package, creating a brief window of opportunity for an attacker to hijack the process. By manipulating the repair process, an attacker can execute commands with elevated privileges. SEC Consult has released an open-source tool, msiscan, to help users identify exploitable Installer files. Although Microsoft has issued a patch, many users may not apply it immediately, leaving systems vulnerable. The attack is not effective with recent versions of the Edge browser or Internet Explorer, and specific conditions must be met for exploitation. Users are advised to scan their systems and apply the patch to mitigate risks.

- Microsoft has patched a critical vulnerability in Windows Installer that allows privilege escalation.

- The flaw, CVE-2024-38014, can be exploited by low-privileged users during application repair processes.

- SEC Consult has provided an open-source tool to identify vulnerable Installer files.

- The vulnerability is actively being exploited, emphasizing the need for immediate action from users.

- Not all .msi files are exploitable, and specific browser conditions affect the attack's success.

Link Icon 1 comments