- Content source
- https://cybersecuritynews.com/windows-lpe-vulnerabilities/
Read more on:Security researchers are increasingly focusing on privilege escalation attacks through two primary Windows attack surfaces: kernel drivers and named pipes.
These vectors exploit fundamental trust boundary weaknesses between the user and kernel modes. Enabling attackers to escalate from standard user privileges to SYSTEM-level access.
Kernel drivers present a significant LPE attack surface due to insufficient input validation in IOCTL (I/O Control) processing routines.
In WDM-based drivers using METHOD_BUFFERED mode, the I/O Manager allocates kernel buffers. However, he fails to validate user-supplied data before kernel processing.
This creates a critical gap that allows attackers to craft malicious IOCTL requests containing pointer and length values that the kernel interprets within its address space.
The exploitation chain involves three key phases:
Windows Vulnerabilities via Kernel Drivers and Named Pipes Allows Privilege Escalation
Attackers are increasingly exploiting Windows kernel drivers and named pipes to gain SYSTEM-level privileges from regular user access.
cybersecuritynews.com