Windows Zero-Day Allows Admin Escalation, Exploit PoC is Public
A recent disclosure of a Windows-based zero-day flaw means that attackers could go for local privilege escalation in Windows 10, Windows 11, and Windows Server, potentially becoming an Admin.
This is a case of an enhanced vulnerability, as it bypasses a patch that Microsoft had already issued. An independent security researcher and a bug bounty hunter, Abdelhamid Naceri, found that recent patch vulnerable. Thus the workaround enhances the issue that was originally tracked as CVE-2021-41379. A working proof-of-concept exploit was publicly released by Naceri, making this matter actively perilous. Naceri decided to release the PoC publicly after seeing decreases in bounties for impactful bugs. In some people's experiences, a bounty was cut tenfold.
Advice from X-Force is in line with the current situation, and linked with MITRE ATT&CK mitigations as follows:
C-Suite Cyber Crisis Coach, Business Development, Krav-Maga Instructor
3yThx Limor, useful message to be spread, ttys