Exploiting Windows Update Vulnerabilities
New research unveiled at the Black Hat security conference in Las Vegas has exposed critical vulnerabilities in Windows Update that can be exploited to downgrade Windows to an older, more vulnerable version. This downgrade opens up a host of historical vulnerabilities that can be leveraged to gain full control of the system. The researchers have dubbed this exploit “Downdate.”
The Discovery of a Critical Flaw
SafeBreach Labs researcher Alon Leviev uncovered the flaw while investigating a hack that utilized downgrading the Windows boot manager to an older, exploitable version. Leveraging insights from the Windows update process, Leviev developed a method to strategically downgrade Windows components, including the core NT kernel, which is crucial for system operations.
The Process of Exploitation
By focusing on manipulating key components of the Windows update process, Leviev was able to downgrade drivers, dynamic link libraries, and security elements like Credential Guard and Virtual Machine Hypervisor. This allowed for the reintroduction of known vulnerabilities that could be targeted by malicious actors.
Microsoft’s Response and Mitigation Strategies
Microsoft is actively working on mitigations to address these risks, following a thorough investigation and update development process for affected versions. They are carefully undoing vulnerable system files, prioritizing customer protection while minimizing operational disruption. It is crucial for the developer community to be vigilant against downgrade attacks as attackers devise stealthy methods to infiltrate systems.