{"id":34746,"date":"2024-08-08T14:44:32","date_gmt":"2024-08-08T12:44:32","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=34746"},"modified":"2024-08-08T14:48:14","modified_gmt":"2024-08-08T12:48:14","slug":"vulnerability-in-windows-update-allows-downgrade-attacks-august-2024","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/08\/08\/vulnerability-in-windows-update-allows-downgrade-attacks-august-2024\/","title":{"rendered":"Vulnerability in Windows Update allows downgrade attacks (August 2024)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/08\/08\/schwachstelle-in-windows-update-ermglicht-downgrade-angriffe-august-2024\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A security researcher from SafeBreach has taken a closer look at the Microsoft Windows update architecture. He discovered vulnerabilities in the operating system's update function (which are basically serious design flaws) that enable a downgrade attack. An attacker can thus roll back security updates that have already been installed and even prevent the installation of further updates, so that the supposedly patched vulnerabilities continue to exist. This manipulation is not recognizable and is not shown. Microsoft has been aware of this since February 2024, but has not yet provided any update to close the vulnerability &#8211; only some advisories has been published yesterday.<\/p>\n<p><!--more--><\/p>\n<h2>What are downgrade attacks?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg09.met.vgwort.de\/na\/2ed2ef232adb48baa16a602a0c315e3c\" alt=\"\" width=\"1\" height=\"1\" \/>It is a clever method of attack that basically boils down to a very unpleasant story that jeopardizes the security of Windows. In downgrade attacks, the software (in this case Windows) is forced to revert to an older version that is vulnerable to vulnerabilities. In the case of Windows, for example, this would mean that updates are uninstalled and the installation of new updates is prevented. In addition, the attack could be carried out in such a way that the user does not even notice it because the software reports that it is up to date.<\/p>\n<h2>MS has blocked BlackLotus downgrade attacks<\/h2>\n<p>Windows security is not always at its best. In 2023, the infamous BlackLotus UEFI bootkit emerged, which downgrades the Windows boot manager to an older version in order to bypass Secure Boot (see <a href=\"https:\/\/borncity.com\/win\/2023\/03\/01\/blacklotus-uefi-bootkit-bypasses-secure-boot-in-windows-11\/\">BlackLotus UEFI bootkit bypasses Secure Boot in Windows 11<\/a>). Sicherheitsforscher von ESET hatte das Problem gefunden.<\/p>\n<p>Microsoft has responded in the context of the BlackLotos UEFI bootkit. Firstly, there is a patch to close the vulnerability. And Windows has been retrofitted with protection against unintentional downgrading of the Secure Boot.<\/p>\n<h2>Downgrade attacks via Windows Update<\/h2>\n<p>Security researcher Alon Leviev from SafeBreach Labs has taken a closer look at the Microsoft Windows update process as a result of the Black Lotus attack. He wonders whether downgrade attacks, such as those seen with Black Lotus, are possible via Windows Update. In search of an undetectable downgrade flow, the security researchers then took a closer look at Windows Update. The update mechanism is probably the least suspicious unit for the execution of downgrade attacks.<\/p>\n<p>In the process, Leviev discovered vulnerabilities that allow him to uninstall installed security updates and thus open up vulnerabilities that have already been closed. He has thus identified the Achilles' heel of Windows Update, which makes it possible to take complete control of the update process.<\/p>\n<p>The security researcher has managed to create downgrade updates for Windows, bypassing all verification steps during the update installation. This also includes the enforcement of the use of Trusted Installer enforced by Windows, writes Leviev. In this way, the security researcher was able to roll back the operating system to an older patch version.<\/p>\n<p>Using techniques developed by the security researcher, critical operating system components, including DLLs, drivers and even the NT kernel, were downgraded in terms of update status. The operating system then reported that it had been fully updated and was unable to install future updates. No problems were detected by the recovery and scanning tools.<\/p>\n<p>The researchers then searched the Windows internals further and discovered that the entire virtualization stack was also at risk. They successfully downgraded the Hyper-V hypervisor, the Secure Kernel and the Isolated User Mode process of Credential Guard. This makes it possible to uncover previous privilege escalation vulnerabilities.<\/p>\n<h2>Presentation at BlackHat 2024 in the USA<\/h2>\n<p>Security researcher Alon Leviev from SafeBreach Labs is presenting this problem at the BlackHat 2024 conference currently taking place. A presentation on <a href=\"https:\/\/www.blackhat.com\/us-24\/briefings\/schedule\/index.html#windows-downdate-downgrade-attacks-using-windows-updates-38963\" target=\"_blank\" rel=\"noopener\">Windows Downdate: Downgrade Attacks Using Windows Updates<\/a> has been announced for August 7, 2024.<\/p>\n<p><a href=\"https:\/\/www.blackhat.com\/us-24\/briefings\/schedule\/index.html#windows-downdate-downgrade-attacks-using-windows-updates-38963\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Windows-Sicherheit\" src=\"https:\/\/i.postimg.cc\/yxnNYT46\/image.png\" alt=\"Windows-Sicherheit\" \/><\/a><\/p>\n<p>In the session linked above, Leviev showed what vulnerabilities exist in this regard on August 7, 2024. If I interpret it correctly, these vulnerabilities can be exploited by unprivileged users [Addendum: Initially, Leviev probably had administrator rights]. Quote from the security researcher:<\/p>\n<blockquote><p>By downgrading, I was able to make a fully patched Windows machine vulnerable to thousands of vulnerabilities from the past, turning fixed vulnerabilities into zero-days and rendering the term \"fully patched\" meaningless on any Windows machine in the world.<\/p>\n<p>Leviev also delivered a paper at defcon, which can be accessed via <a href=\"https:\/\/defcon.org\/html\/defcon-32\/dc-32-speakers.html#54522\" target=\"_blank\" rel=\"noopener\">this link<\/a>.<\/p><\/blockquote>\n<h2>No patch available<\/h2>\n<p>Microsoft has been aware of the problem since February 2024, as the company was informed by Leviev. When the security researcher reported the vulnerability, he was informed that Microsoft had not yet done anything with regard to a security update &#8211; the whole thing remains unpatched to this day according to current knowledge.<\/p>\n<p>Microsoft issued <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21302\" target=\"_blank\" rel=\"noopener\">CVE-2024-21302<\/a>\u00a0and\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38202\" target=\"_blank\" rel=\"noopener\">CVE-2024-38202<\/a> \u2014and sent the following official response:<\/p>\n<div class=\"wp-block-cover alignfull is-light has-parallax\">\n<blockquote>\n<div class=\"wp-block-cover__image-background wp-image-335 has-parallax\"><em>\"We appreciate the work of SafeBreach in identifying and responsibly reporting this vulnerability through a coordinated vulnerability disclosure.\u202fWe are actively developing mitigations to protect against these risks while following an extensive process involving a thorough investigation, update development across all affected versions, and compatibility testing, to ensure maximized customer protection with minimized operational disruption.\"<\/em><\/div>\n<\/blockquote>\n<\/div>\n<h2>More details available<\/h2>\n<p>After publishing my German article, I found this morning also the blog post <a href=\"https:\/\/www.safebreach.com\/blog\/downgrade-attacks-using-windows-updates\/\" target=\"_blank\" rel=\"noopener\">Windows Downdate: Downgrade Attacks Using Windows Updates<\/a> from August 7, 2024 in the Safebreach blog, where further details are given. The following <a href=\"https:\/\/x.com\/safebreach\/status\/1820950473991479524\" target=\"_blank\" rel=\"noopener\">tweet<\/a> also provides a link in the meantime (it wasn't available last night).<\/p>\n<p><a href=\"https:\/\/x.com\/safebreach\/status\/1820950473991479524\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/i.postimg.cc\/k5c0ggDv\/image.png\" alt=\"Windows Update Downgrade attack\" \/><\/a><\/p>\n<p>The article is well worth reading because it names the horse and rider and explains how attacks can be carried out via the Windows update mechanism (action lists, pending.xml etc.). When analyzing the facts, the security researcher came across the following, for example:<\/p>\n<ul>\n<li>Only the catalog files containing the updates are digitally signed.<\/li>\n<li>The files for the manifest and the MUMs are not explicitly signed, but are signed by the catalog files.<\/li>\n<li>Differential files used for the update are also not signed.<\/li>\n<\/ul>\n<p>The differential files also control the content of the final update file. If you manage to manipulate these files, you have the key to the vault, so to speak. The security researcher has succeeded in completely taking over Windows Update with a downgrade attack:<\/p>\n<ul>\n<li><em>Fully undetectable<\/em>. As the downgrade attack was carried out in a legitimate manner, no malicious activity is detectable.<\/li>\n<li><em>Invisible.<\/em> he downgrade attack technically \"updates\" the system so that it appears fully updated.<\/li>\n<li><em>Persistent.<\/em> The security researcher discovered that the action list parser poqexec.exe is not digitally signed. Therefore, he was able to create a patch that installs empty updates, which means that all newly available updates are installed incorrectly (everything looks ok on the outside, but the patch is not installed).<\/li>\n<li><em> Irreversible.<\/em> The security researcher also discovered that the integrity and repair program SFC.exe is not digitally signed. With a patched version, the security researcher ensured that SFC no longer recognizes any damage.<\/li>\n<\/ul>\n<p>There is still <em>DISM.exe<\/em>, but it recognizes damage in the component memory. Therefore, there is no reason to change this program, the component memory is intact &#8211; the downgrade attack via Windows Update starts in the update installation process and ensures that the Trusted Installer cannot execute the fixes &#8211; files to be replaced during the update are simply no longer updated, but Windows reports a successfully installed update.<\/p>\n<p>The above information splinters show why Microsoft cannot patch the \"problem\" quickly. At the moment, I cannot estimate how simple the attack is (for example: can it be carried out remotely or only locally). At the very least, there are indications that the entire Windows update architecture is shaky. In my opinion, Microsoft's failings over the last few decades are falling heavily on its feet.<\/p>\n<p>For cyber attackers, the only question is: how much effort is involved and is there an easier way to achieve penetration? But state actors will take a very close look at the new findings and develop appropriate strategies. Let's see how Microsoft reacts &#8211; there could be the next big earthquake in the Windows universe.<\/p>\n<p>Microsoft has announced a Secure Future Initiative. But I fear that this will fizzle out or it will be far too late. If I look at the following list of links to posts here in the blog, there is now a major incident or disaster every few weeks. With the above findings, administrators can no longer be sure that an operating system displayed as \"fully patched\" is really up to date. The question remains: \"Who is the elephant in the room?\"<\/p>\n<p><strong>Similar articles<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/03\/01\/blacklotus-uefi-bootkit-bypasses-secure-boot-in-windows-11\/\">BlackLotus UEFI bootkit bypasses Secure Boot in Windows 11<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/05\/13\/kb5025885-secure-boot-hardening-against-vulnerability-cve-2023-24932-black-lotus\/\" rel=\"bookmark\">KB5025885: Secure boot hardening against vulnerability CVE-2023-24932 (Black Lotus)<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2024\/07\/19\/worldwide-outage-of-microsoft-365-july-19-2024\/\" rel=\"bookmark\">Worldwide outage of Microsoft 365 (July 19, 2024)<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2024\/07\/19\/ausfall-von-microsoft-365-und-weltweite-strungen\/\"><strong><br \/>\n<\/strong><\/a><a href=\"https:\/\/borncity.com\/win\/2024\/07\/19\/windows-systems-throw-bsod-due-to-faulty-crowdstrike-update\/\">Windows systems throw BSOD due to faulty<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/07\/19\/windows-systems-throw-bsod-due-to-faulty-crowdstrike-update\/\">\u00a0CrowdStri<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/07\/19\/windows-systems-throw-bsod-due-to-faulty-crowdstrike-update\/\">ke<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/07\/19\/windows-systems-throw-bsod-due-to-faulty-crowdstrike-update\/\">\u00a0update<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2024\/07\/19\/ausfall-von-microsoft-365-und-weltweite-strungen\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/07\/21\/why-numerous-it-systems-around-the-world-failed-due-to-two-errors-on-july-19-2024\/\">Why numerous IT systems around the world failed due to two errors on July 19, 2024<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2024\/07\/19\/ausfall-von-microsoft-365-und-weltweite-strungen\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/07\/23\/crowdstrike-analysis-why-an-empty-file-led-to-bluesceen\/\">CrowdStrike analysis: Why an empty file led to BlueSceen<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2024\/07\/19\/ausfall-von-microsoft-365-und-weltweite-strungen\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/07\/24\/review-of-the-crowdstrike-incident-the-biggest-computer-glitch-of-all-time\/\">Review of the CrowdStrike incident, the biggest computer glitch of all time<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2024\/07\/19\/ausfall-von-microsoft-365-und-weltweite-strungen\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/07\/27\/crowdstrike-incident-sensor-failure-as-a-previously-unknown-side-effect\/\">CrowdStrike incident: sensor failure as a previously unknown side effect?<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2024\/07\/19\/ausfall-von-microsoft-365-und-weltweite-strungen\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/07\/28\/crowdstrike-investigation-report-amount-of-damages-and-compensation-attribution-of-blame\/\">CrowdStrike: Investigation report; amount of damages and compensation; attribution of blame<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2024\/07\/19\/ausfall-von-microsoft-365-und-weltweite-strungen\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/08\/06\/microsofts-analysis-of-the-crowdstrike-incident-and-recommendations\/\" rel=\"bookmark\">Microsoft's analysis of the CrowdStrike incident and recommendations<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/08\/07\/crowdstrike-new-report-current-status-lawsuits-and-more\/\" rel=\"bookmark\">CrowdStrike: New report, current status, lawsuits and more<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2023\/07\/13\/china-hacker-storm-0558-accessed-outlook-accounts-in-microsofts-cloud\/\">China hacker (Storm-0558) accessed Outlook accounts in Microsoft's cloud<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/07\/18\/follow-up-to-the-storm-0558-cloud-hack-microsoft-is-still-in-the-dark\/\">Follow-up to the Storm-0558 cloud hack: Microsoft is still in the dark<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/07\/20\/nach-cisa-bericht-zum-storm-0558-hack-stellt-microsoft-kunden-erweitertes-cloud-logging-bereit\/\" rel=\"bookmark\">After CISA report on Storm-0558 hack, Microsoft provides customers with enhanced cloud logging<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/07\/22\/stolen-aad-key-allowed-storm-0558-wide-ranging-access-to-microsoft-cloud-services\/\">Stolen AAD key allowed (Storm-0558) wide-ranging access to Microsoft cloud services<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/08\/16\/microsofts-storm-0588-cloud-hack-us-senator-among-the-victims\/\" rel=\"bookmark\">Microsoft's Storm-0558 cloud hack: US senator among the victims<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/09\/07\/microsofts-storm-0588-cloud-hack-msa-key-comes-from-windows-crash-dump-of-a-pc\/\" rel=\"bookmark\">Microsoft's Storm-0558 cloud hack: MSA key comes from Windows crash dump of a PC<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/10\/24\/microsoft-extends-purview-logging-after-storm-0558-hack\/\" rel=\"bookmark\">Microsoft extends Purview logging (after Storm-0558 hack)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/01\/20\/microsoft-hacked-by-russian-midnight-blizzard-emails-exfiltrated-since-nov-2023\/\">Microsoft hacked by Russian Midnight Blizzard; emails exfiltrated since Nov. 2023<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/01\/28\/how-midnight-blizzard-hackers-were-able-to-penetrate-microsofts-email-system\/\">How Midnight Blizzard hackers were able to penetrate Microsoft's email system<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/03\/09\/microsoft-confirms-russian-spies-midnight-blizzard-stole-source-code-while-accessing-systems\/\" rel=\"bookmark\">Microsoft confirms: Russian spies (Midnight Blizzard) stole source code while accessing systems<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/06\/29\/microsoft-news-from-the-midnight-blizzard-hack-customers-may-also-be-affected\/\" rel=\"bookmark\">Microsoft: News from the Midnight Blizzard hack \u2013 customers may also be affected<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/01\/25\/hewlett-packard-enterprise-hpe-hacked-by-midnight-blizzard-since-may-2023\/\">Hewlett Packard Enterprise (HPE) hacked by Midnight Blizzard since May 2023<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2023\/08\/03\/microsoft-as-a-security-risk-u-s-senator-calls-for-microsoft-to-be-held-accountable-over-azure-cloud-hack-part-1\/\">Microsoft as a Security Risk? U.S. senator calls for Microsoft to be held accountable over Azure cloud hack<\/a>\u2013 Part 1<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2023\/08\/03\/microsoft-as-a-security-risk-azure-vulnerability-unpatched-since-march-2023-heavy-criticism-from-tenable-part-2\/\" target=\"_blank\" rel=\"noopener\">Microsoft as a Security Risk? Azure vulnerability unpatched since March 2023, heavy criticism from Tenable<\/a>\u00a0\u2013 Part 2<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/06\/15\/whistleblower-microsoft-ignored-warnings-about-ad-bug-was-exploited-in-2020-solarwinds-hack\/\">Whistleblower: Microsoft ignored warnings about AD bug; was exploited in 2020 SolarWinds hack<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/06\/16\/microsoft-engages-in-damage-limitation-at-congressional-hearing-13-6-2024-safety-takes-priority-over-ai\/\">Microsoft engages in damage limitation at congressional hearing (13.6.2024): Safety takes priority over AI<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/07\/09\/midnight-blizzard-hack-microsoft-sends-notification-to-customers-by-email-that-ends-up-in-spam-folders\/\" rel=\"bookmark\">Midnight Blizzard hack: Microsoft sends notification to customers by email that ends up in SPAM folders<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A security researcher from SafeBreach has taken a closer look at the Microsoft Windows update architecture. He discovered vulnerabilities in the operating system's update function (which are basically serious design flaws) that enable a downgrade attack. An attacker can thus &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/08\/08\/vulnerability-in-windows-update-allows-downgrade-attacks-august-2024\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22,2],"tags":[69,195,194],"class_list":["post-34746","post","type-post","status-publish","format-standard","hentry","category-security","category-update","category-windows","tag-security","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=34746"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34746\/revisions"}],"predecessor-version":[{"id":34747,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/34746\/revisions\/34747"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=34746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=34746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=34746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}