{"id":22115,"date":"2021-11-13T00:18:00","date_gmt":"2021-11-12T23:18:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=22115"},"modified":"2022-11-03T10:39:56","modified_gmt":"2022-11-03T09:39:56","slug":"0patch-fixt-lpe-schwachstelle-cve-2021-34484-in-windows-user-profile-service","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/11\/13\/0patch-fixt-lpe-schwachstelle-cve-2021-34484-in-windows-user-profile-service\/","title":{"rendered":"0patch fixes LPE Vulnerability (CVE-2021-34484) in Windows User Profile Service"},"content":{"rendered":"<p><img decoding=\"async\" style=\"margin: 0px 10px 0px 0px;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/?p=259373\" target=\"_blank\" rel=\"noopener\">German<\/a>]There is an incompletely patched Local Privilege Escalation vulnerability (CVE-2021-34484) in the Windows User Profile Service. Although there has been an update for all Windows versions since August 2021, it does not fully patch the vulnerability. ACROS Security has therefore developed a free 0patch solution to mitigate this vulnerability.<\/p>\n<p><!--more--><\/p>\n<h2>The LPE vulnerability (CVE-2021-34484)<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg08.met.vgwort.de\/na\/c396cfe520cb4921b90f76995e9868f7\" alt=\"\" width=\"1\" height=\"1\" \/>In August 2021, Microsoft published security advisory <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34484\" target=\"_blank\" rel=\"noopener\">CVE-2021-34484<\/a> on a vulnerability in Windows User Profile Service. This vulnerability allows Local Privilege Escalation (LPE). However, details of the vulnerability reported by Abdelhamid Naceri (halov) &#8211; works for <a href=\"https:\/\/www.zerodayinitiative.com\/\" target=\"_blank\" rel=\"noopener\">Trend Micro Zero Day Initiative<\/a>Initiative &#8211; were not provided. At the same time, Microsoft has patched the vulnerabilities via the August 2021 Windows security updates.<\/p>\n<p>Security researcher Abdelhamid Naceri then looked into the matter after installing the security update and found that it did not fully close the LPE vulnerability. It was possible for him to bypass the security mechanism introduced by the Microsoft patch. Naceri points out the issue in the <a href=\"https:\/\/twitter.com\/KLINIX5\/status\/1451558296872173577\" target=\"_blank\" rel=\"noopener\">following tweet<\/a>.<\/p>\n<p><a href=\"https:\/\/twitter.com\/KLINIX5\/status\/1451558296872173577\"><img decoding=\"async\" title=\"CVE-2021-34484 bypass in Windows\" src=\"https:\/\/i.imgur.com\/Swi7e1M.png\" alt=\"CVE-2021-34484 bypass in Windows\" \/><\/a><\/p>\n<p>He described some details on <a href=\"https:\/\/web.archive.org\/web\/20220906084817\/https:\/\/github.com\/klinix5\/ProfSvcLPE\" target=\"_blank\" rel=\"noopener\">GitHub<\/a> and also provided a proof of concept (<a href=\"https:\/\/web.archive.org\/web\/20220417093221\/https:\/\/github.com\/klinix5\/ProfSvcLPE\/tree\/main\/DoubleJunctionEoP\" target=\"_blank\" rel=\"noopener\">PoC<\/a>). I had reported about this issue in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/10\/29\/local-privilege-escalation-schwachstelle-0-day-in-allen-windows-versionen\/\">Local Privilege Escalation Vulnerability (0-day) in all Windows Versions<\/a>.<\/p>\n<h2>The 0Patch solution for CVE-2021-34484<\/h2>\n<p>The team at ACROS Security, which has been providing the 0Patch solution for years, has analyzed the LPE vulnerability CVE-2021-34484 and provided a micropatch to render the vulnerability harmless. Mitja Kolsek drew attention to this free solution via <a href=\"https:\/\/twitter.com\/0patch\/status\/1458545386243727361\" target=\"_blank\" rel=\"noopener\">Twitter<\/a>.<\/p>\n<p><a href=\"https:\/\/twitter.com\/0patch\/status\/1458545386243727361\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"0Patch fix for CVE-2021-34484\" src=\"https:\/\/i.imgur.com\/gvmdM0E.png\" alt=\"0Patch fix for CVE-2021-34484\" \/><\/a><\/p>\n<p>More detail may be found in <a href=\"https:\/\/blog.0patch.com\/2021\/11\/micropatching-incompletely-patched.html\" target=\"_blank\" rel=\"noopener\">this blog post<\/a> from November 11, 2021 by 0patch. The 0patch micropatches are available for free for the following products:<\/p>\n<ul>\n<li><b>Windows 10 v21H1 (32 &amp; 64 bit) <\/b>updated with October or November 2021 Updates<\/li>\n<li><b>Windows 10 v20H2 (32 &amp; 64 bit)<\/b><b> <\/b>updated with October or November 2021 Updates<\/li>\n<li><b>Windows 10 v2004 (32 &amp; 64 bit)<\/b><b> <\/b>updated with October or November 2021 Updates<\/li>\n<li><b>Windows 10 v1909 (32 &amp; 64 bit)<\/b><b> <\/b>updated with October or November 2021 Updates<\/li>\n<li><b>Windows Server 2019 64 bit<\/b> <b><\/b>updated with October or November 2021 Updates<\/li>\n<\/ul>\n<p>Notes on how the 0patch agent works, which loads the micropatches into memory at the runtime of an application, can be found in the blog posts (such as <a href=\"https:\/\/www.borncity.com\/blog\/2020\/03\/05\/windows-7-mit-der-0patch-lsung-absichern-teil-2\/\" target=\"_blank\" rel=\"noopener\">here<\/a>).<\/p>\n<p><strong>Similar articles<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/09\/08\/angriff-ber-office-dokumente-auf-microsoft-mshtml-activex-rce-schwachstelle-cve-2021-40444\/\">Attack via Office Documents on Microsoft MSHTML (ActiveX) RCE Vulnerability (CVE-2021-40444)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/09\/10\/mshtml-schwachstelle-cve-2021-40444-kritischer-als-bekannt\/\">MSHTML vulnerability CVE-2021-40444 more critical than known<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/09\/14\/desaster-windows-mshtml-schwachstelle-cve-2021-40444-hoffentlich-kommt-heute-ein-patch\/\">Disaster Windows MSHTML vulnerability CVE-2021-40444, hopefully a patch will come today<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/09\/17\/patchday-nachlese-sept-2021-patch-der-mshtml-schwachstelle-cve-2021-40444\/\">Patch day recap Sept. 2021: Update on MSHTML vulnerability CVE-2021-40444<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2020\/01\/21\/0patch-fix-for-internet-explorer-0-day-vulnerability-cve-2020-0674\/\">0patch: Fix for Internet Explorer 0-day vulnerability CVE-2020-0674<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/14\/0patch-fix-for-windows-installer-flaw-cve-2020-0683\/\">0patch: Fix for Windows Installer flaw CVE-2020-0683<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/20\/0patch-fix-for-windows-gdi-vulnerability-cve-2020-0881\/\">0patch fix for Windows GDI+ vulnerability CVE-2020-0881<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/24\/0-day-vulnerability-in-windows-adobe-type-library\/\">0-day vulnerability in Windows Adobe Type Library<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/04\/23\/0patch-fixt-cve-2020-0687-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-0687 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/05\/21\/0patch-fixes-cve-2020-1048-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1048 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/05\/27\/0patch-fixt-cve-2020-1015-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1015 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/07\/10\/0patch-fr-0-day-rce-schwachstelle-in-zoom-fr-windows\/\">0patch for 0-day RCE vulnerability in Zoom for Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/07\/18\/windows-server-2008-r2-0patch-fixes-sigred-vulnerability\/\">Windows Server 2008 R2: 0patch fixes SIGRed vulnerability<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/08\/12\/0patch-fixt-cve-2020-1113-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1113 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/02\/0patch-fixt-cve-2020-1337-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1337 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/11\/0patch-fixt-cve-2020-1530-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1530 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/18\/0patch-fixt-zerologon-cve-2020-1472-in-windows-server-2008-r2\/\">0patch fixes Zerologon (CVE-2020-1472) vulnerability in Windows Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20210621200302\/https:\/\/borncity.com\/win\/2020\/10\/17\/0patch-fixt-cve-2020-1062-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1062 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/11\/19\/0patch-fixt-cve-2020-1300-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1300 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/11\/26\/0patch-fixt-0-day-schwachstelle-in-windows-7-server-2008-r2\/\">0patch fixes 0-day vulnerability in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/24\/0patch-fixt-cve-2020-1013-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1013 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/08\/0patch-fixt-local-privilege-escalation-0-day-in-sysinternals-psexec\/\">0patch fixes a Local Privilege Escalation 0-day in Sysinternals PsExec<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/28\/0patch-fixt-windows-installer-0-day-local-privilege-escalation-schwachstelle\/\">0patch fixes Windows Installer 0-day Local Privilege Escalation vulnerability<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/02\/08\/0patch-fixt-0-day-im-internet-explorer\/\">0patch fixes 0-day in Internet Explorer<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/03\/24\/0patch-fixt-cve-2021-2687-im-dns-server-von-windows-server-2008-r2\/\">0patch fixes CVE-2021-26877 in the DNS server of Windows Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/05\/07\/0patch-fixt-windows-installer-lpe-bug-cve-2021-26415\/\">0patch fixes Windows Installer LPE-Bug (CVE-2021-26415)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/05\/18\/0patch-bietet-support-fr-windows-10-version-1809-nach-eol\/\">0Patch provides support for Windows 10 version 1809 after EOL<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/06\/21\/windows-10-v180x-0patch-fixt-ie-schwachstelle-cve-2021-31959\/\">Windows 10 V180x: 0Patch fixes IE vulnerability CVE-2021-31959<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/07\/03\/0patch-micropatches-fr-printnightmare-schwachstelle-cve-2021-34527\/\">0Patch Micropatches for PrintNightmare Vulnerability (CVE-2021-34527)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/06\/0patch-fix-fr-neue-windows-printnightmare-0-day-schwachstelle-5-aug-2021\/\">0patch fix for new Windows PrintNightmare 0-day vulnerability (Aug. 5, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/07\/0patch-fix-fr-windows-petitpotam-0-day-schwachstelle-6-aug-2021\/\">0patch fix for Windows PetitPotam 0-day vulnerability (Aug. 6, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/08\/20\/2-0patch-fix-fr-windows-petitpotam-0-day-schwachstelle-19-aug-2021\/\">2nd 0patch fix for Windows PetitPotam 0-day vulnerability (Aug. 19, 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/09\/27\/windows-10-0patch-fix-fr-mshtml-schwachstelle-cve-2021-40444\/\">Windows 10: 0patch fix for MSHTML vulnerability (CVE-2021-40444)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]There is an incompletely patched Local Privilege Escalation vulnerability (CVE-2021-34484) in the Windows User Profile Service. Although there has been an update for all Windows versions since August 2021, it does not fully patch the vulnerability. ACROS Security has therefore &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/11\/13\/0patch-fixt-lpe-schwachstelle-cve-2021-34484-in-windows-user-profile-service\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[69,194],"class_list":["post-22115","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=22115"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/22115\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=22115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=22115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=22115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}