In a startling revelation at Black Hat 2024, SafeBreach security researcher Alon Leviev presented findings regarding a critical security vulnerability in Microsoft's Windows operating systems. He uncovered that two unpatched zero-day vulnerabilities could be leveraged in downgrade attacks to “unpatch” fully updated systems, specifically Windows 10, Windows 11, and Windows Server. This type of attack raises significant concerns, as it reintroduces outdated vulnerabilities that may have been fixed in previous updates.
The Downgrade Attack Explained
Leviev's research highlighted a method where attackers can manipulate the Windows update process to force a target device to revert to older software versions. This rollback to earlier versions could include critical components such as dynamic link libraries (DLLs) and the NT Kernel, all while the operating system inaccurately reports that it is fully updated. The implications of this discovery are dire; it means that even fully patched machines could be exposed to previously resolved security issues, effectively nullifying the security assurances usually provided by regular updates.How It Works
The exploit leverages zero-day vulnerabilities tracked as CVE-2024-38202 and CVE-2024-21302. By exploiting these flaws, an attacker could downgrade essential protective features:- Credential Guard's Secure Kernel
- Isolated User Mode Process
- Hyper-V's Hypervisor According to Leviev, he discovered multiple routes to disable Windows virtualization-based security (VBS) features, which are traditionally aimed at enhancing the security of the system's kernel and critical services. Remarkably, this includes bypassing UEFI locks, which are supposed to provide a layer of protection against such downgrades. Leviev expressed that, because of this attack vector, the term "fully patched" can essentially become meaningless for any Windows machine, as the downgrade process can reintroduce thousands of past vulnerabilities.
Implications for Windows Users
This research comes at a time when security is paramount for individuals and businesses alike. The ability for a malicious actor to revert a device's security state to a more vulnerable version practically unravels the trust users place in Microsoft's update mechanisms.Security Malpractice
- Undetectable Threat: One of the most concerning aspects of this attack is its stealth. Current security measures, including endpoint detection and response (EDR) solutions, cannot block these downgrade attacks. Windows Update will still declare that the device is fully updated despite it being compromised.
- Zero-Day Vulnerabilities: The vulnerabilities being exploited have not yet been patched by Microsoft, posing a significant risk to users who may unknowingly remain exposed to security threats. Microsoft has acknowledged the issue and is actively developing a security update, but the timeline for a viable fix remains unclear.