New Windows 10 zero day: A security researcher and exploit broker known as SandboxEscaper today published details of a zero day affecting Windows 10 and Windows Server 2019 operating systems.
The details posted on GitHub, in the same repository, where the researcher has already published another eight zero days.
Today's exploit is a second bypass for Microsoft CVE-2019-0841 vulnerability. The first exploit for the same vulnerability was published two weeks ago.
According to Microsoft, CVE-2019-0841 is a vulnerability that allows users with very few permissions to access NT AUTHORITY \ SYSTEM files by simply overwriting the permissions of the target file.
Successful exploitation of course gives "full control" rights to the low that had minimal rights, according to Nabeel Ahmed of Dimension Data Belgium, who revealed the error to Microsoft.
Microsoft has released for the first time an update for CVE-2019-0841 April 2019.
On GitHub today, SandboxEscaper reports that there is a second way to bypass CVE-2019-0841 fixes and allow an attacker with very few rights to "play" with files that he previously did not have full control over.
Here we should mention that this is another one vulnerability LPE (local privilege escalation), which means that attacking hackers can not exploit the error to enter systems, but can use it to gain full access to files that they would not normally have control over.
The zero day introduced today by SandboxEscaper uses an innovative technique, but there are certainly easier, faster and more efficient ways to get a higher permissions on Windows - for example, using one of SandboxEscaper's previous zero days.
It is also worth noting that although Microsoft had time to fix the previous three zero days, it did not fix them. To see if he does it in the next Patch Tuesday which is scheduled for next week, June 11th.