securityonline.info
Open in
urlscan Pro
2a05:d014:776:a63e:ceb:15ad:bbb7:6a9d
Public Scan
URL:
https://securityonline.info/poc-released-for-windows-sysinternals-sysmon-privilege-escalation-cve-2023-29343-bug/
Submission: On October 29 via api from IN — Scanned from DE
Submission: On October 29 via api from IN — Scanned from DE
Form analysis
2 forms found in the DOMhttps://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
https://securityonline.info/
<form role="search" class="search-form" action="https://securityonline.info/"><label><span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" name="s"></label>
<input type="submit" class="search-submit" value="Search">
</form>
Text Content
Skip to content Cybersecurity News * Search for: * Home * Cyber Security * Data Leak * Linux * Malware Attack * Open Source Tool * Technology * Vulnerability * Windows * Home * Cyber Security * Data Leak * Linux * Malware Attack * Open Source Tool * Technology * Vulnerability * Windows Search for: Cybersecurity News * Vulnerability POC RELEASED FOR WINDOWS SYSINTERNALS SYSMON PRIVILEGE ESCALATION (CVE-2023-29343) BUG by do son · June 18, 2023 In the dynamic world of cybersecurity, threats are constantly evolving, necessitating vigilance from system administrators and everyday users alike. A proof-of-concept (PoC) exploit for the Microsoft Windows SysInternals Sysmon privilege escalation flaw, traced as CVE-2023-29343 has been publicly released by security researcher Filip Dragović. This Elevation of Privilege Vulnerability could potentially grant authenticated attackers the ability to obtain SYSTEM privileges, the highest level of authority in the Windows environment. The bug at the heart of this issue involves the Sysmon tool, a Windows system service and device driver that monitors and logs system activity to the Windows event log. As Dragović has detailed, the issue lies in how Sysmon validates access and ownership of its archive directory. After the last security patch, Sysmon was configured to check if the archive directory exists, and if so, confirm it is owned by the SYSTEM. Moreover, it ensured that access was granted exclusively to SYSTEM. Should both these conditions be met, Sysmon would proceed to write or delete files within this directory. Image: Filip Dragović Unfortunately, as Dragović noted, it’s not possible for low-privilege users to alter file or directory ownership. This necessitated the identification of a directory already owned by SYSTEM but granting full access—or at least WRITE_DAC, DELETE, and FILE_WRITE_ATTRIBUTES—to a low-privilege user or any group such a user might belong to. Microsoft initially addressed the bug by releasing security updates on May 9th, urging all customers to immediately apply these patches to prevent potential exploitation attempts. Dragović’s proof-of-concept, however, highlights the continued need for system maintenance and security vigilance. With the PoC exploit for CVE-2023-29343 now public, it’s likely that threat actors will scramble to exploit this vulnerability in a bid to carry out nefarious activities, including data theft, ransomware deployment, or other forms of cyber sabotage. Custom versions of the exploit could potentially target any unpatched Windows system, making this a critical concern for businesses and individual users who may not yet have implemented the provided patches. Security vulnerabilities such as CVE-2023-29343 underscore the importance of diligent system upkeep and prompt application of security patches. To avoid falling victim to this bug, users should ensure their systems are updated with the latest patches and have strong security measures in place. Share Tags: CVE-2023-29343 Follow: * * * * * SEARCH Visit Penetration Testing Tools & The Information Technology Daily Support Securityonline.info site. Thanks! * Malware / Vulnerability Akira Ransomware Exploits SonicWall SSLVPN Flaw (CVE-2024-40766) September 8, 2024 * Vulnerability Rockwell Automation Products Face Critical Security Risks, Urgent Patching Required September 13, 2024 * Vulnerability Tor Project Responds to De-Anonymization Report: Network Remains Secure for Most Users September 19, 2024 * Vulnerability Critical CUPS Vulnerabilities Expose Linux and Other Systems to Remote Attacks September 26, 2024 * Vulnerability Chrome Releases Stable Channel Update Addressing High Security Vulnerabilities October 3, 2024 Reward BRILLIANTLY SAFE! securityonline.info CONTENT & LINKS Verified by Sur.ly 2022 WEBSITE 1. About SecurityOnline.info 2. Advertise on SecurityOnline.info 3. Contact * About Us * Contact Us * Disclaimer * Privacy Policy * DMCA NOTICE * Sponsors Cybersecurity News © 2024. All Rights Reserved. * * * * * x ✕ DATENSCHUTZ & TRANSPARENZ securityonline.info und unsere Partner bitten um Ihre Zustimmung zur Nutzung Ihrer persönlichen Daten sowie zum Speichern und/oder Zugreifen auf Informationen auf Ihrem Gerät. Dazu gehört die Nutzung Ihrer persönlichen Daten für personalisierte Werbung und Inhalte, Werbe- und Inhaltsmessung, Publikumsforschung und die Entwicklung von Dienstleistungen. Ein Beispiel für die Verarbeitung von Daten könnte ein eindeutiger Identifikator sein, der in einem Cookie gespeichert wird. Ihre persönlichen Daten können von 901 Partnern gespeichert, abgerufen und geteilt werden oder speziell von dieser Seite genutzt werden. Sie können Ihre Einstellungen jederzeit ändern oder Ihre Zustimmung zurückziehen; der Link dazu befindet sich in unserer Datenschutzrichtlinie am Ende dieser Seite. Einige Anbieter können Ihre persönlichen Daten auf Grundlage eines berechtigten Interesses verarbeiten, gegen das Sie durch Verwalten Ihrer Einstellungen unten Einspruch erheben können. Einstellungen verwalten Nur notwendige Cookies Weiter mit den empfohlenen Cookies Anbieter-Liste | Datenschutzerklärung