Windows Interprocess Communication (IPC) is one of the most complex technologies within the Windows operating system. At the core of this ecosystem is the Remote Procedure Call (RPC) mechanism, which can function as a standalone communication channel or as the underlying transport layer for more advanced interprocess communication technologies. Because of its complexity and widespread use, RPC has historically been a rich source of security issues. Over the years, researchers have identified numerous vulnerabilities in services that rely on RPC, ranging from local privilege escalation to full remote code execution.
Kaspersky researcher discovered a vulnerability in RPC architecture that enables an attacker to create a fake RPC server and escalate their privileges.
securelist.com
Enables escalation from service accounts to SYSTEM across all Windows versions without requiring patches.
Technical details:
• Targets RPC calls to unavailable servers (TermService, DHCP Client, W32Time) with high impersonation levels
• Attack deploys malicious RPC server mimicking legitimate endpoints like ncalrpc:[TermSrvApi] or \PIPE\W32TIME
• Requires SeImpersonatePrivilege but works from Network Service/Local Service contexts (T1134.001)
• Five exploitation paths identified: gpupdate coercion, Edge startup, WDI background service, ipconfig execution, w32tm.exe timing
Attack methodology:
• Attacker compromises service running under Network/Local Service account
• Deploys fake RPC server with same UUID/endpoint as legitimate disabled service
• Legitimate high-privilege process makes RPC call expecting real server
• Malicious server calls RpcImpersonateClient() to assume SYSTEM/Admin context
• ETW monitoring reveals pattern: Event ID 1 with RPC_S_SERVER_UNAVAILABLE (0x800706BA)