Windows DOS-to-NT Flaws Exploited to Achieve Unprivileged Rootkit-Like Capabilities
Security Officer Comments:
Summary:
Security researcher at SafeBreach Or Yair uncovered a technique that exploits vulnerabilities in the DOS-to-NT path conversion process, to achieve rootkit-like capabilities on Windows systems. When a user executes a function with a path argument in Windows, the DOS path of the file or folder is converted to an NT path. However, a known issue arises during this conversion process where the function removes trailing dots from any path element and trailing spaces from the last path element. Or Yair exploited this known issue and discovered two vulnerabilities: CVE-2023-36396 and CVE-2023-32054. CVE-2023-36396 is a Windows Compressed Folder Remote Code Execution Vulnerability and CVE-2023-32054 is a Volume Shadow Copy Elevation of Privilege Vulnerability which provides an attacker with rootkit-like capabilities without needing privileged access.
“I discovered how a malicious actor—without admin privileges—could hide files and processes, hide files in archives, affect prefetch file analysis, make Task Manager and Process Explorer users think a malware file was a verified executable published by Microsoft, disable Process Explorer with a denial of service (DoS) vulnerability, and more,” wrote Or Yair. All issues were reported to the Microsoft Security Response Center (MSRC) in 2023. Microsoft acknowledged these issues and took the following action:
This discovery highlights the prevalence of how known issues that seem harmless could be exploited and pose a serious security risk. The implications are relevant not only to Microsoft Windows, which is the world’s most widely used desktop OS but also to all software vendors, most of whom also allow known issues to persist from version to version of their software.
Suggested Corrections:
Microsoft did address the vulnerabilities but has decided to leave the DOS-to-NT path conversion known issue unfixed. SafeBreach has provided a research repository that includes tools that enable the verification of these vulnerabilities and serve as a basis for further research and development.
Link(s):
https://securityaffairs.com/162129/security/windows-dos-to-nt-flaws-rootkit-like-capabilities.html