A vulnerability in Update Assistant των Windows 10 δίνει τη δυνατότητα σε κακόβουλους users, to run code with SYSTEM privileges.
The elevation of privilege is documented in CVE-2019-1378, where Microsoft explains that an attacker can create a full user account by eventually gaining access to install malware to take control of the device.
"There is a privilege vulnerability in Windows 10 Update Assistant in the way it manages permissions", says Microsoft.
“A locally certified intruder could run malicious code with increased system privileges. After successfully exploiting the vulnerability, the attacker could install programs, view, change, or delete data, create new accounts with full user rights. "
The bug was discovered and reported to Microsoft by Jimmy Bayne and is available in Windows 10 Update Assistant regardless of the version of Windows 10 you have installed.
As reported on Bleepingcomputer, some computers start running the Windows 10 Update Assistant after installing the KB4023814 update. However, this update is only for Appliances running Windows 10 version 1803 (April 2018 Update) or something newer and is supposed to prepare the "soil" for it upgrade on Windows 10 version 1903 (May 2019 Update).
On the other hand, devices running Update Assistant on Windows 10 on the 1903 version are also vulnerable to attacks if the update was installed manually.
Microsoft has already released a new version of Update Assistant to resolve the vulnerability and recommends all users to install it as soon as possible. The only way to fix the flaw is not to automatic install this new version, at least until the patch is included in some update rollup. Of course you should uninstall the older version:
Microsoft reports that the defect was not publicly disclosed and thus no (yet) exploit has been released. However, you need to update your system.