The Risk of Tampering with Windows Security Patches via Malicious Software Interference
The Risk of Tampering with Windows Security Patches via Malicious Software Interference
Security researcher Alon Leviev has discovered a vulnerability in Windows Update that allows attackers to disable security patches without detection. This downgrade attack can potentially compromise fully updated Windows systems, and expose them to old threats which Microsoft has already patched.
According to Leviev, he wanted to test the protection Windows offers against downgrade attacks. To his surprise, Windows barely has any fail safes to prevent unauthorized OS rollbacks. The researcher found serious security flaws in Windows Update that he exploited to gain elevated system privileges and breeze past Windows security. Using a custom tool called Windows Downdate, he managed to downgrade system files, drivers , and the Windows kernel (the core program which has full control over the operating system) on Windows 10 and 11.
The downgrades he made remained undetectable and persistent, meaning they were invisible to Windows Update and system recovery tools. They’re also irreversible. The attack would trick the victim into thinking their machine is up-to-date (as Windows Update would confirm). But the core components would have been quietly replaced with older versions, exposing them to thousands of already-fixed vulnerabilities.
Leviev also discovered critical flaws in the Windows virtualization security, including Hyper V . Exploiting those flaws, he managed to downgrade and bypass virtualization security features. The researcher warns that Windows might not be the only operating system vulnerable to downgrade attacks.
There have been no attacks in the wild using this attack vector, which is good news. But Leviev demoed it at Black Hat USA 2024 and DEF CON 32 2024. He also reached out to Microsoft in February, when he first identified these threats.
Microsoft has since been working on an update to patch them, but six months later, it’s still not available. “We are actively developing mitigations to protect against these risks while following an extensive process involving a thorough investigation, update development across all affected versions, and compatibility testing, to ensure maximized customer protection with minimized operational disruption,” Microsoft stated in an official response.
Source: Alon Leviev via Safebreach
Also read:
- [New] Essential Call Customization Applications Ranked for 2024
- [New] In 2024, Perfect Screen Capture on Mac The Top 5 Recommended Approaches
- [New] The Editing Game Changer FCP's Best 10 Plugins
- [New] Transcribing Online Master the Art of Free YouTube Conversion
- [New] Unlock iPhone Editing Magic Shorter, Smaller Videos
- [New] Unveiling the Top 4 Fullscreen Recorder for PC & Mac Users
- [Updated] 2024 Approved Effortless Video Streams YouTube Loops for Television Viewers
- [Updated] Elevate Design Top-Tier Tips From Canva Experts
- [Updated] Refining Online Discussions in Google Meet for 2024
- [Updated] Tapping Into Traditional Hymns Downloads & Editing Guide
- [Updated] The Insider's Guide to Creating Viral Memes on 9GAG
- 2024 Approved How-To Manual for Creating an Inclusive and Productive Skype Chat Room Accessible by Both Windows & Mac Users
- 2024 Approved Ideal Accessories for Optimal GoPro Photography
- 2024 Approved Ultimate List of Text Tools & Plugins
- 2024 Approved Unlock Optimal Performance with These Key Tricks
- 6 Fixes to Unfortunately WhatsApp has stopped Error Popups On Samsung Galaxy F54 5G | Dr.fone
- The Essence of UAVs Understanding Their Mechanics & Use for 2024
- Unlock the Power of Time-Lapse with GoPro Hero5 for 2024
- Unlocking Windows' High Dynamic Range Potential for 2024
- Title: The Risk of Tampering with Windows Security Patches via Malicious Software Interference
- Author: Christopher
- Created at : 2025-01-08 20:15:29
- Updated at : 2025-01-09 22:33:19
- Link: https://some-approaches.techidaily.com/the-risk-of-tampering-with-windows-security-patches-via-malicious-software-interference/
- License: This work is licensed under CC BY-NC-SA 4.0.