ALPC Task Scheduler 0-Day
ALPC Task Scheduler 0-Day On Monday (August 27, 2018) a Local Privilege Escalation (LPE) 0-day was released which reportedly affects Windows 10 and Server 2016, at a minimum. We investigated this to understand the vulnerability, the current Proof of Concept (PoC) exploit, and wanted to write it up in terms which explain the actual risk to organizations. The main things to know are this: This is an LPE, which means It needs to be chained with other attacks to be meaningful It makes a bad situation (server/end user compromise) much worse It allows an unprivileged user to gain SYSTEM level access The attacker needs to start with code execution in a Medium integrity process In practical terms, it means unlocking the ability to potentially dump password hashes with tools like mimikatz, modify boot settings, gain additional persistence such as installing rootkits, and so forth The current PoC is just an example, as is typical with PoCs Does not demonstrate the full cap...