Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Top 10 Startup and Tech Funding News – June 9, 2025

Everything Apple just announced on the wwdc25: “Liquid Glass”, Tahoe, and ChatGpt Playground

University of Michigan dumps private safety after reporting surveillance

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Experts reveal four new privilege escalation flaws in Windows Task Scheduler
Identity

Experts reveal four new privilege escalation flaws in Windows Task Scheduler

userBy userApril 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 16, 2025Ravi LakshmananEndpoint security/vulnerability

Cybersecurity researchers detail four different vulnerabilities in the core components of Windows task scheduling services. This could be exploited by local attackers to achieve privilege escalation, erasing logs and concealing evidence of malicious activity.

This issue is revealed in a binary named “schtasks.exe”. This allows administrators to create, delete, query, modify, run, and terminate tasks that are scheduled on local or remote computers.

“a [User Account Control] A bypass vulnerability was found in Microsoft Windows, allowing attackers to bypass the User Account Control prompt and allow high-privilege (System) commands to be run without user approval.

Cybersecurity

“By exploiting this weakness, attackers can increase privileges and execute malicious payloads with administrator rights, leading to unauthorized access, data theft, or further compromise on the system.”

The cybersecurity company said it happens when an attacker creates a scheduled task using batch logon (i.e. password) in contrast to an interactive token.

However, for this attack to work, it depends on threat actors who obtain passwords through other means, such as authentication to SMB servers and cracking the NTLMV2 hash after exploiting flaws such as CVE-2023-21726.

The ultimate result of this issue is that conservative users can leverage the schtasks.exe binary to obtain maximum allowed privileges using known passwords for members of the group, such as administrators, backup operators, and performance log users.

Registering scheduled tasks using the batch logon authentication method using an XML file can also pave the way for two defense avoidance techniques that allow you to overwrite the task event log and effectively clear the audit trail of previous activities.

Cybersecurity

Specifically, this involves registering the task with the author of the name of the name, for example, if the character A is repeated 3,500 times in an XML file, overwriting the entire description in the XML task log. This behavior can be further extended to override the entire “c:\windows\system32\winevit\logs\security.evtx” database.

“The Task Scheduler is a very interesting component. It creates tasks started by the system running the system, juggles between privileges, and can be accessed through process integrity and user spoofing,” Enkaoua said.

“UAC bypass is not the only vulnerability reported in the first place. That’s more than that. Essentially, it’s a way to impersonate a password from the CLI to the user and use the /ru and /rp flags to obtain the maximum allowed privileges in the task execution session.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFFGI announces FFG tokens: a new chapter in blockchain-based film finance
Next Article Openai launches a pair of AI inference models for O3 and O4-Mini
user
  • Website

Related Posts

More than 70 organizations in multiple sectors targeted by China-linked cyberspy groups

June 9, 2025

Two different botnets exploiting a vulnerability in Wazuh Server to launch a Mirai-based attack

June 9, 2025

Chrome 0-Day, Data Wipers, Misused Tools and Zero-Click iPhone Attacks

June 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Top 10 Startup and Tech Funding News – June 9, 2025

Everything Apple just announced on the wwdc25: “Liquid Glass”, Tahoe, and ChatGpt Playground

University of Michigan dumps private safety after reporting surveillance

Jason Calacanis has acquired more than $1 million on begin.com and invites startups to build on it

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top 10 Startup and Tech Funding News – June 9, 2025

Everything Apple just announced on the wwdc25: “Liquid Glass”, Tahoe, and ChatGpt Playground

Jason Calacanis has acquired more than $1 million on begin.com and invites startups to build on it

IONQ acquires nearly $1.1 billion in British quantum startup Oxford Ionics

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.