Security researchers recently disclosed an Information discloser vulnerability (CVE-2021-24084) in Windows 10, enabling an attacker to gain unauthorized file system access and read arbitrary files on the vulnerable system. Microsoft has released the patch in Feb 2021. Unfortunately, the patch has failed to fully fix the CVE-2021-24084 vulnerability. However, there is an unofficial patch released by Opatch which could be used as a workaround until Microsoft address this issue. Let’s see how to fix CVE-2021-24084- Information Discloser Vulnerability In Windows 10.
The good news is that the no Windows server operating systems are affected as the “Access work or school” vulnerable functionality doesn’t exist on the server operating system. No need to worry about the server platform. This vulnerability affects Windows 10 operating system, which is the most used Windows operating system these days. However, the vulnerability doesn’t affect the Windows 10 v1803 and older. Since the vulnerable functionality “Access work or school” works in a different way in Windows 10 v1803 and older. Windows 7 users do not need to worry since it doesn’t have “Access work or school” functionality at all.
You should fix the CVE-2021-24084 vulnerability if you are running Windows 10 v1809 and subsequent releases. Here you see the list of Windows 10 vulnerable to the Information Discloser Vulnerability.
Windows 10 v21H1 (32 & 64 bit) updated with November 2021 Updates
Windows 10 v20H2 (32 & 64 bit) updated with November 2021 Updates
Windows 10 v2004 (32 & 64 bit) updated with November 2021 Updates
Windows 10 v1909 (32 & 64 bit) updated with November 2021 Updates
Windows 10 v1903 (32 & 64 bit) updated with November 2021 Updates
Windows 10 v1809 (32 & 64 bit) updated with May 2021 Updates
According to NVD, the vulnerability scores 5.5 Medium in CVSS v3.0. However, we expect that the score could be increased and categorized ‘High’ considering the vulnerability could lead to local privilege elevation attacks.
Associated CVE ID | CVE-2021-24084 |
Description | A pre-authentication buffer overflow vulnerability allows network-adjacent attackers to execute arbitrary code on affected Netgear products. |
Associated ZDI ID | |
CVSS Score | 5.5 MEDIUM |
Vector | AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Impact Score | 3.6 |
Exploitability Score | 1.8 |
Attack Vector (AV) | Local |
Attack Complexity (AC) | Low |
Privilege Required (PR) | Low |
User Interaction (UI) | None |
Confidentiality (C) | High |
Integrity (I) | None |
availability (a) | None |
https://twitter.com/KLINIX5/status/1460338968780804098?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1460338968780804098%7Ctwgr%5Ehb_2_7%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fthreatpost.com%2Funpatched-windows-zero-day-privileged-file-access%2F176609%2F
The vulnerability was first identified in Oct 2020 by Abdelhamid Naceri and reported to Trend Micro’s Zero Day Initiative (ZDI) program. Then ZDI reported the flaw to Microsoft. Microsoft acknowledged the flaw and released the patch in Feb 2021 as part of its monthly security updates. However, the researcher noticed that the flaw wasn’t fixed by any means and reported it to ZDI again. After multiple follow-ups, Microsoft finally released the fix in its July 2021 monthly security updates. But, after examination, Abdelhamid Naceri said in his blog that he discovered the flaw again and reported it to ZDI in Oct 2021. Microsoft is yet to fix the vulnerability, making it a zero-day bug. However, Opatch has released a micropatch to stop abusing the vulnerability to its users. Please visit this post, “How to Fix CVE-2021-34484” to install Opatch agent on Windows 10 to fix CVE-2021-24084- Information Discloser Vulnerability In Windows 10.
We recommend following Abdelhamid Naceri’s blog, where the researcher recently disclosed the Local Privilege Elevation (LPE) vulnerability in the patch released to fix the CVE-2021-41379. And also, follow Opatch’s blog for upcoming updates on the Windows zero-day vulnerabilities.
The vulnerability associated with “access work or school” functionality in Windows settings. It can be triggered by clicking on “Export your management log files” on the right top corner of the settings window. As soon as you click on the “Export,” Windows will trigger the Device Management Enrollment Service.
The Device Management Enrollment Service copies some log files to the C:\ProgramData\Microsoft\MDMDiagnostics folder, then packs them into a CAB file. Before the CAB file is stored in the C:\Users\Public\Public Documents\MDMDiagnostics folder, the CAB file will be temporarily copied to C:\Windows\Temp folder.
“It is the copying to C:\Windows\Temp folder that is vulnerable. Namely, a local attacker can create a soft link (junction) there with a predictable file name that will be used in the above-described process, pointing to some file or folder they want to have copied to the CAB file. Since the Device Management Enrollment Service runs as Local System, it can read any system file that the attacker can’t”.
Posted by Mitja Kolsek on November 26, 2021
Please find Proof of Concept and more technical details on this page.
Visit Optch and login if you have an account created or register using an email ID.
Note: It’s a free registration.
https://central.0patch.com/auth/login
Download the Opatch agent from here: https://0patch.com/
You do not need to do anything big to install the patch. Launch the agent, the patch will be installed by itself.
Choose the installation path. If not keep the default.
You will start seeing the number of available updates on the dashboard upon signing in to the agent.
Click on the ‘PATCH WAS APPLIED’ tiles to see the patch was applied for the CVE-2021-24084 Vulnerability.
We hope this post would help you in knowing how to fix CVE-2021-24084- Information Discloser Vulnerability In Windows 10. Thanks for reading this threat post. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.