• XSS.stack #1 – первый литературный журнал от юзеров форума

CVE-2025-24061 1-Day | MoTW & SmartScreen Bypass | RCE

В этой теме можно использовать автоматический гарант!

Статус
Закрыто для дальнейших ответов.

EncryptHub

CD-диск
Забанен
Регистрация
05.11.2024
Сообщения
13
Реакции
0
Пожалуйста, обратите внимание, что пользователь заблокирован
Цена
10000$
Контакты
https://t.me/FortiGuard_Ops
🚀 Critical vulnerability in Windows allows bypassing MoTW and SmartScreen, leading to remote code execution (RCE) via trusted OS mechanisms.


✅ Not detected by antivirus and not blocked by MoTW protection
✅ Does not trigger SmartScreen warnings
✅ Launch prompt appears under "Microsoft Corporation" name
✅ After confirmation, executed with SYSTEM privileges (if the user is an administrator)
✅ Bypasses corporate email and download filters



📌 Example Usage


📩 Step 1: Delivery
The file can be delivered via email, cloud storage, internal corporate resources, or physical media. Since the file does not contain MoTW indicators, it is not blocked by browsers or antivirus.


🖥️ Step 2: Execution
  • A single non-standard launch request
  • UAC prompt appears under "Microsoft Corporation" name, creating trust
  • Once the user clicks "Yes" to proceed, the code executes with SYSTEM privileges

🎯 Step 3: Further Exploitation
  • Persistence via Group Policy
  • Deployment of a backdoor or proxy for remote management
  • Collection of corporate credentials and internal configurations
  • Network propagation without triggering protective mechanisms



📉 CVSS v3.1: 8.8 (High)


Attack Vector: Local (AV:L)
Exploit Complexity: Low (AC:L)
Privileges Required: Administrator privileges required (PR:H)
Impact: Full system control (C:H/I:H/A:H)


💡 An exploitation method that bypasses standard protection mechanisms and provides full system control with minimal user interaction.
 
Последнее редактирование модератором:
Статус
Закрыто для дальнейших ответов.
Верх