Windows 0day vulnerability threatens Web3 asset security Experts explain the attack principles

robot
Abstract generation in progress

Microsoft Windows system has a serious 0day vulnerability that may endanger Web3 security

Recently, Microsoft released a security patch that fixed a Windows system privilege escalation vulnerability being exploited by hackers. This vulnerability mainly exists in earlier versions of the Windows system and cannot be triggered on Windows 11.

This type of win32k privilege escalation vulnerability has a long history. In the context of continuously improving security measures, it is worth noting how attackers continue to exploit this vulnerability. We conducted an in-depth analysis of this vulnerability in a Windows Server 2016 environment.

A 0day vulnerability refers to a system vulnerability that has not yet been publicly disclosed or patched, which can be silently exploited by hackers and has great destructive potential. Through this Windows system-level 0day vulnerability, hackers may gain complete control of the system.

Once the system is controlled by hackers, the consequences include but are not limited to personal information leakage, system crashes and data loss, financial losses, and the implantation of malicious software. For individual users, cryptocurrency private keys may be stolen, and digital assets may be transferred; on a larger scale, this vulnerability could even affect the entire Web3 ecosystem running on Web2 infrastructure.

Numen Exclusive: Microsoft 0day Vulnerability Can Disrupt Web3 Landscape at System + Physical Level

By analyzing the patch code, we found that the problem was caused by an object's reference count being processed one time too many. According to earlier source code comments, the previous code only locked the window object and did not lock the menu object within the window object, leading to the possibility of the menu object being incorrectly referenced.

Numen Exclusive: Microsoft 0day Vulnerability Can Unravel Web3 Landscape at System + Physical Levels

We constructed a special multi-layer nested menu structure to trigger this vulnerability. By carefully designing the menu properties and reference relationships, we can successfully release specific menu objects when certain functions return to the user layer, leading to subsequent code referencing invalid objects.

Numen Exclusive: Microsoft 0day Vulnerability Can Disrupt Web3 Landscape at System + Physical Level

The key to exploiting this vulnerability lies in how to control the cbwndextra parameter to a particularly large value. We ultimately chose to achieve this goal by manipulating memory layout to control the memory data of adjacent objects.

Numen Exclusive: Microsoft 0day Vulnerability Can Disrupt Web3 Landscape at System + Physical Level

To build a stable exploit, we designed a special memory layout that includes multiple contiguous window objects and window class objects. By releasing and reoccupying specific objects, control over key parameters can be achieved.

Numen Exclusive: Microsoft 0day Vulnerability Can Disrupt the Web3 Landscape at System + Physical Level

In terms of reading and writing primitives, we use GetMenuBarInfo() to achieve arbitrary reads and SetClassLongPtr() to achieve arbitrary writes. Except for the write operation that replaces TOKEN, other writes are completed using offsets with the class object of the first window object.

Numen Exclusive: Microsoft 0day Vulnerability Can Disrupt Web3 Landscape at System and Physical Levels

Although Microsoft is trying to refactor the win32k-related code using Rust, such vulnerabilities still pose a serious threat to existing Windows systems. The exploitation process is relatively simple and mainly relies on the leakage of the desktop heap handle address.

Numen Exclusive: Microsoft 0day Vulnerability Can Disrupt Web3 Landscape at System + Physical Level

We speculate that the discovery of this vulnerability may be attributed to improved code coverage detection techniques. In the future, detection of such vulnerabilities should not only focus on the critical points of the functions that trigger the vulnerabilities but also emphasize the detection of abnormal memory layouts and data read/write operations.

Numen Exclusive: Microsoft 0day Vulnerability Could Upend the Web3 Landscape at System + Physical Levels

TOKEN-3.64%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 8
  • Share
Comment
0/400
ForumLurkervip
· 4h ago
The system is going to be upgraded again.
View OriginalReply0
SurvivorshipBiasvip
· 7h ago
Switching to Mac, goodbye!
View OriginalReply0
MEVHuntervip
· 11h ago
Another arbitrage opportunity doesn't come empty-handed.
View OriginalReply0
ConsensusDissentervip
· 11h ago
Newbie, stop pretending. It doesn't matter.
View OriginalReply0
MEVSandwichVictimvip
· 12h ago
Why is it another Win's hole? I'm feeling anxious.
View OriginalReply0
GasFeeTearsvip
· 12h ago
Ridiculous, are you harvesting my gas again?
View OriginalReply0
tokenomics_truthervip
· 12h ago
I'm scared, I need to quickly back up my Wallet.
View OriginalReply0
MintMastervip
· 12h ago
Scaring people all day again.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)