Microsoft Windows Task Scheduler Security Feature Bypass
Posted by deepcore on May 16, 2020 – 9:23 pm
Compass Security identified a security feature bypass vulnerability in Microsoft Windows. Due to the absence of integrity verification requirements for the RPC protocol and in particular the Task Scheduler, a man-in-the-middle attacker can relay his victim’s NTLM authentication to a target of his choice over the RPC protocol. Provided the victim has administrative privileges on the target, the attacker can execute code on the remote target.
Post a reply
You must be logged in to post a comment.