Security News Windows 10 Upgrade Vulnerability Makes Any PC Super Easy to Hack

BoraMurdar

Super Moderator
Thread author
Verified
Staff Member
Well-known
Aug 30, 2012
6,598
Security expert discovers flaw in Windows 10 in-place upgrade system that gives hackers admin rights

Getting administrator privileges on a Windows 10 computer no longer requires complex tactics and malware, as a security expert has discovered that all hackers need to do is to press the Shift + F10 key combination during an in-place upgrade.

Sami Laiho writes that an exploit is possible because BitLocker is suspended when a new build is deployed on a computer running Windows 10, and the Windows Preinstallation Environment allows users to launch a command prompt window by simply pressing Shift + F10.

The problem is that this command prompt window is launched with system access, so a potential attacker could make use of this to run a series of commands with administrator privileges on a target computer.

Laiho explains that this bug affects not only any computer running Windows 10 insider builds, but also systems that are updating from the RTM version of Windows 10 to November Update or Anniversary Update, as the same in-place upgrade system is being used.

“The real issue here is the Elevation of Privilege that takes a non-admin to SYSTEM (the root of Windows) even on a BitLocker (Microsoft's hard disk encryption) protected machine. And of course that this doesn't require any external hardware or additional software,” he says.

BitLocker suspended during in-place upgrades
What’s important to note, however, is that during an in-place upgrade, BitLocker is not disabled, but suspended, so the TPM checks and the password protection are both bypassed, providing access to local drives from the command prompt window.

There are several ways for companies and users to prevent a successful exploit, including WSUS, which basically restricts upgrades on Windows 10 computers to a trusted environment.

In the case of consumers, however, this shouldn’t be a problem anyway if they don’t leave their computers unattended for a longer period of time while performing an in-place upgrade. Physical access to a system is needed to take advantage of the bug.

As far as companies and state departments are concerned, however, this is a much critical vulnerability. There are many employees who leave the desk when installing a Windows 10 upgrade, mostly because the process takes longer to complete, so a cybercriminal could easily access to the system using this bug in a matter of seconds.

On the good side, Microsoft has already been informed of the bug and the company is working on a patch. There are no details as to when it could be released, but expect it to ship sometime very soon.
 
W

Wave

This isn't even as big as the article makes out, Windows systems are already 'super easy to hack' because many home users are inexperienced and are very vulnerable to the basic social engineering tactics, therefore end up downloading and running the malicious software, and in often cases even provide the malware administrator privileges - or the malware can use old but effective tactics to trick the user into providing administrator rights thinking it is for an Adobe update when it's really for the malware.

As for businesses, many employees just want to be helpful and get over with their day and are not trained properly, therefore chances are they'll fall for an e-mail being spoofed to make the e-mail appear to be from someone higher up in management, resulting in them downloading and running the attachment, escalating to infection of the systems. Some employees who access their e-mails and work on the company systems won't even check the damn sender and will just go on auto-pilot to downloading and running the attachment which appears to be a document for Microsoft Word, but is really an executable (double extension - social engineering trick).

Social engineering is actually one of the biggest threats out there, and it can be deadly in some situations... Everyone is prone to it eventually, some are weaker than others - but no one is immune and that is simply down to how our brains as humans work. One day it might all be good, the next day you might realise you made a big mistake by entering those payment details on that fake amazon purchase page, since now the attacker has robbed all your money and run off.
 

BoraMurdar

Super Moderator
Thread author
Verified
Staff Member
Well-known
Aug 30, 2012
6,598
This sentence is the most important actually
In the case of consumers, however, this shouldn’t be a problem anyway if they don’t leave their computers unattended for a longer period of time while performing an in-place upgrade. Physical access to a system is needed to take advantage of the bug.

So, a computer is only as secure as the administrator is trustworthy.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top