Windows Task Scheduler Zero-Day Exposed; No Patch Available

Share on twitter
Tweet
Share on whatsapp
WhatsApp
Share on facebook
Share

A zero-day flaw has been revealed by a Twitter user SandboxEscaper, for the Windows Task Scheduler in 64-bit Windows 10 and Windows Server 2016 systems. Apparently, this vulnerability is out in the wild, and there are no known patches or specific workarounds at present.

US-CERT has confirmed that the exploit works on 64-bit Windows 10 and Windows Server 2016 systems and is rooted in the Windows task scheduler.

“Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the Advanced Local Procedure Call (ALPC) interface, which can allow a local user to obtain SYSTEM privileges.”

In an angry Twitter post, SandboxEscaper also released a proof of concept to go along with the bug.

https://twitter.com/SandboxEscaper/status/1034125195148255235

The nature of the tweet suggests that he had a bad experience with Microsoft while trying to submit either this bug or previous bugs to the company — which ultimately lead him to choose Twitter to disclose this serious vulnerability publicly.

How does it work?

Researcher Kevin Beaumont has given a breakdown of the exploit in a blog post.

“This exploit misuses SchRpcSetSecurity to alter permissions (I wouldn’t recommend running it a live system by the way) to allow a hard link to be created, and then calls a print job using XPS printer (installed with Windows XP Service Pack 2+) to call the hijack DLL as SYSTEM (via the Spooler process).”

Microsoft Windows has a ‘task scheduler’ function that gives users the ability to schedule execution of programs at pre-decided times. The ALPC interface in it is basically a process communication facility used by OS components in Windows for message-transferring.

Here, a part of this interface termed SchRpcSetSecurity is open for access so anyone can set local file permissions through it. Since the API function of ALPC does not check permissions, any potential local bad actor can alter them to gain escalated privileges.

In response to this incident, Microsoft stated to The Register that it would “proactively update impacted devices as soon as possible.” A fix for this issue will most likely arrive on Microsoft’s next Patch Tuesday that is scheduled for September 11.

Also Read: Amazon Is Working On A New, Free Video Streaming Service: Report
Manisha Priyadarshini

Manisha Priyadarshini

An Editor and a Tech Journalist with a software development background. I am a big fan of technology and memes. At Fossbytes, I cover all aspects of tech but my specific area of interest is Programming and Development.

New on Fossbytes

Scroll to Top