{"id":20812,"date":"2021-07-27T00:04:00","date_gmt":"2021-07-26T22:04:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=20812"},"modified":"2021-09-06T23:22:22","modified_gmt":"2021-09-06T21:22:22","slug":"remotepotato0-privilege-escalation-schwachstelle-im-windows-rpc-protocol","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/07\/27\/remotepotato0-privilege-escalation-schwachstelle-im-windows-rpc-protocol\/","title":{"rendered":"RemotePotato0: Privilege Escalation Vulnerability in Windows RPC Protocol"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Windows\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/07\/26\/remotepotato0-privilege-escalation-schwachstelle-im-windows-rpc-protocol\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Every Windows system is vulnerable to a specific NTLM relay attack that could allow attackers to escalate privileges from user to domain admin. This vulnerability has a status of \"not being fixed\" and was the subject of the PetitPotam approach I addressed over the weekend. Now <em><a href=\"https:\/\/www.linkedin.com\/in\/antonio-cocomazzi\/\" target=\"_blank\" rel=\"noopener\">Antonio Cocomazzi<\/a>&nbsp; <\/em>has pointed out the vulnerability called RemotePotato0. This uses the Windows RPC protocol for privilege escalation.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/5442c9ba2d2a48538277cbfecdfb5e2a\" width=\"1\" height=\"1\">The topic is not new, as the security researcher at Sentinel already pointed out this vulnerability in April 2021. Now he has published his <a href=\"https:\/\/github.com\/antonioCoco\/RemotePotato0\/releases\/tag\/1.1\" target=\"_blank\" rel=\"noopener\">RemotePotato0 Cross Session Activation tool<\/a> on Github, which I came across via the following <a href=\"https:\/\/twitter.com\/decoder_it\/status\/1419403714222301186\" target=\"_blank\" rel=\"noopener\">tweet<\/a>.<\/p>\n<p><a href=\"https:\/\/twitter.com\/decoder_it\/status\/1419403714222301186\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"RemotePotato0-Schwachstelle in Windows\" alt=\"RemotePotato0-Schwachstelle in Windows\" src=\"https:\/\/i.imgur.com\/JtX1bHM.png\"><\/a><\/p>\n<p>The GIF published on <a href=\"https:\/\/twitter.com\/splinter_code\/status\/1419405036350758916\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> demonstrates the use of the tool. The Github post doesn't give that much for me, but the Sentinel security researchers around Antonio Cocomazzi pointed to the separate article with further explanations in this <a href=\"https:\/\/twitter.com\/decoder_it\/status\/1419545302072274947\" target=\"_blank\" rel=\"noopener\">tweet<\/a> on Twitter.&nbsp;&nbsp;&nbsp; <\/p>\n<p><a href=\"https:\/\/twitter.com\/decoder_it\/status\/1419545302072274947\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"RemotePotato0-Schwachstelle in Windows\" alt=\"RemotePotato0-Schwachstelle in Windows\" src=\"https:\/\/i.imgur.com\/XsHcgSD.png\"><\/a><\/p>\n<p>In <a href=\"https:\/\/web.archive.org\/web\/20210822230914\/https:\/\/labs.sentinelone.com\/relaying-potatoes-dce-rpc-ntlm-relay-eop\/\" target=\"_blank\" rel=\"noopener\">his article<\/a>, SentinelLabs security researchers led by Antonio Cocomazzi explain the attack called \"relaying potatos\" via the Windows RPC protocol. The statement: <\/p>\n<ul>\n<li>Every Windows system is vulnerable to a specific NTLM relay attack that could allow attackers to escalate privileges from user to domain admin. <\/li>\n<li>The current status of this vulnerability is set to \"not being fixed\" by Microsoft.<\/li>\n<\/ul>\n<p>In the blog post, security researchers outline how the Windows RPC protocol could be abused for an NTLM relay attack. As a result, the attacker with normal user privileges can elevate his privileges to domain admin. In the blog post, however, the security researchers give advice on what administrators can do to mitigate this attack vector.<\/p>\n<p><strong>Similar articles:<\/strong><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/20\/windows-10-sam-zugriffsrechte-ab-1809-nach-upgrade-kaputt-benutzerzugriff-mglich\/\">Windows 10 upgrade breaks SAM access rights from 1809 upward, user access possible<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/24\/neue-infos-zur-windows-10-schwachstelle-hivenightmare\/\">News about Windows 10 vulnerability HiveNightmare<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/21\/hivenightmare-neue-details-zur-windows-schwachstelle-cve-2021-36934\/\">HiveNightmare: New details about Windows vulnerability CVE-2021-36934<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/19\/printnightmare-point-and-print-erlaubt-die-installation-beliebiger-dateien\/\">PrintNightmare: Point-and-Print allows installation of arbitrary files<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/24\/petitpotam-angriff-erlaubt-windows-domain-bernahme\/\">PetitPotam attack allows Windows domain takeover<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2021\/07\/25\/microsoft-liefert-workaround-fr-windows-petitpotam-ntlm-relay-angriffe\/\">Microsoft's mitigations of Windows PetitPotam NTLM relay attacks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Every Windows system is vulnerable to a specific NTLM relay attack that could allow attackers to escalate privileges from user to domain admin. This vulnerability has a status of \"not being fixed\" and was the subject of the PetitPotam approach &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/07\/27\/remotepotato0-privilege-escalation-schwachstelle-im-windows-rpc-protocol\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[69,194],"class_list":["post-20812","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=20812"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/20812\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=20812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=20812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=20812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}