Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

SLH offers $500-$1,000 per call to recruit women for IT help desk vishing attack

ESA funding call to strengthen local transport networks

A malicious NuGet package stole ASP.NET data. Malware with dropped npm packages

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Experts reveal four new privilege escalation flaws in Windows Task Scheduler
Identity

Experts reveal four new privilege escalation flaws in Windows Task Scheduler

userBy userApril 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 16, 2025Ravi LakshmananEndpoint security/vulnerability

Cybersecurity researchers detail four different vulnerabilities in the core components of Windows task scheduling services. This could be exploited by local attackers to achieve privilege escalation, erasing logs and concealing evidence of malicious activity.

This issue is revealed in a binary named “schtasks.exe”. This allows administrators to create, delete, query, modify, run, and terminate tasks that are scheduled on local or remote computers.

“a [User Account Control] A bypass vulnerability was found in Microsoft Windows, allowing attackers to bypass the User Account Control prompt and allow high-privilege (System) commands to be run without user approval.

Cybersecurity

“By exploiting this weakness, attackers can increase privileges and execute malicious payloads with administrator rights, leading to unauthorized access, data theft, or further compromise on the system.”

The cybersecurity company said it happens when an attacker creates a scheduled task using batch logon (i.e. password) in contrast to an interactive token.

However, for this attack to work, it depends on threat actors who obtain passwords through other means, such as authentication to SMB servers and cracking the NTLMV2 hash after exploiting flaws such as CVE-2023-21726.

The ultimate result of this issue is that conservative users can leverage the schtasks.exe binary to obtain maximum allowed privileges using known passwords for members of the group, such as administrators, backup operators, and performance log users.

Registering scheduled tasks using the batch logon authentication method using an XML file can also pave the way for two defense avoidance techniques that allow you to overwrite the task event log and effectively clear the audit trail of previous activities.

Cybersecurity

Specifically, this involves registering the task with the author of the name of the name, for example, if the character A is repeated 3,500 times in an XML file, overwriting the entire description in the XML task log. This behavior can be further extended to override the entire “c:\windows\system32\winevit\logs\security.evtx” database.

“The Task Scheduler is a very interesting component. It creates tasks started by the system running the system, juggles between privileges, and can be accessed through process integrity and user spoofing,” Enkaoua said.

“UAC bypass is not the only vulnerability reported in the first place. That’s more than that. Essentially, it’s a way to impersonate a password from the CLI to the user and use the /ru and /rp flags to obtain the maximum allowed privileges in the task execution session.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFFGI announces FFG tokens: a new chapter in blockchain-based film finance
Next Article Openai launches a pair of AI inference models for O3 and O4-Mini
user
  • Website

Related Posts

SLH offers $500-$1,000 per call to recruit women for IT help desk vishing attack

February 25, 2026

A malicious NuGet package stole ASP.NET data. Malware with dropped npm packages

February 25, 2026

Manual processes are putting national security at risk

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

SLH offers $500-$1,000 per call to recruit women for IT help desk vishing attack

ESA funding call to strengthen local transport networks

A malicious NuGet package stole ASP.NET data. Malware with dropped npm packages

Manual processes are putting national security at risk

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.