Zero-day vulnerability was found in all current versions of Windows: no solution yet
A new zero-day vulnerability has been discovered in Windows 10, Windows 11, and Windows Server that allows elevation of local privileges and gaining administrator privileges. An exploit has already been published on the Internet for its exploitation, which can be used by hackers to gain full control over the device. The vulnerability is relevant to all current versions of Windows.
Earlier this month, Microsoft patched a permissions change through Windows Setup that was classified as CVE-2021-41379. The vulnerability was discovered by information security specialist Abdelhamid Naseri, and thanks to him, Microsoft released the necessary patch. But now the same expert has found a way to bypass this patch and introduced a new, even more powerful zero-day vulnerability. Moreover, he posted a working experimental exploit on GitHub to exploit the new vulnerability, highlighting that it works on all supported versions of Microsoft's operating system.
BleepingComputer tested the exploit in question, called InstallerFileTakeOver, and reported that it only took a few seconds for the standard account to get admin rights. Tests were conducted with Windows 10 21H1 build 19043.1348.
Naseri himself said that he had disclosed a new zero-day vulnerability because he was too frustrated by Microsoft's significant cut in bounty awards for bugs found in the corporation's software.
A source: bleepingcomputer