A new vulnerability has been discovered in Windows 10 that allows anyone to get administrator privileges. The vulnerability is owed to an issue with file access permissions for some files associated with the Windows registry. Specifically, security researchers have shown that it’s possible for anyone to access the data stored in the Security Account Manager (SAM) file in Windows 10.
The SAM file stores user credentials for the users on a computer, so naturally, it should be off-limits. However, as noted by security researcher Jonas Lykkeggard (via Bleeping Computer), the SAM file actually can be accessed by anyone. You might not usually notice that because the file is constantly in use by Windows, which makes it inaccessible to users. But these vulnerability in Windows 10 opens a whole can of worms.
Windows backs up these files when creating Shadow Copies of a drive, and these backed-up files aren’t in use. Because they still have the same permissions, any user on the computer can access a backed SAM file and see the login credentials for other users. That includes administrators, so you can easily log into an account that has administrator privileges. You can see an example of a user finding a hashed NTLM password using this permission oversight in the video below. The user can then change the password and use the new password to perform any tasks that require administrator privileges.
This vulnerability was apparently introduced with Windows 10 version 1809, when Microsoft changed the permissions on registry files. While this vulnerability is still present in Windows 10 version 20H2, it seems like that’s only the case if you’ve upgraded to this version. According to security analyst Will Dormann, if you clean install Windows 10 version 20H2, the vulnerability isn’t present.
That does make this vulnerability somewhat limited in scope. You’ll need to have created a Shadow Copy of your drive in the past so you have an accessible SAM file, and not a lot of people do. You also have to have had your PC for some time without a clean install. Regardless, it’s a major oversight that could cause serious problems. Hopefully, Microsoft will issue a fix that applies to existing machines sometime soon. Just recently, a vulnerability was discovered in the Print Spooler service in Windows, the second one in about a month.
Comments
Post a Comment