Hacker reveals second Zero-Day that bypasses patch for Windows EoP flaw

In News

An anonymous security researcher called SandboxEscaper has publicly shared a second zero-day exploit that bypasses a recently patched vulnerability in the Microsoft Windows operating system.

Dubbed ByeBear, the new exploit abuses Microsoft Edge browser to write discretionary access control list (DACL) as SYSTEM privilege.

“It’s going to increase the thread priority to increase our odds of winning the race condition that this exploits. If your VM freezes, it means you either have 1 core or set your VM to have multiple processors instead of multiple cores… which will also cause it to lock up,” the researcher said.

This bug is most definitely not restricted to the edge. This will be triggered with other packages too. So you can definitely figure out a way to trigger this bug silently without having edge pop up. Or you could probably minimize edge as soon as it launches and closes it as soon as the bug completes,” he added.

 

Comments

You may also read!

Data Protection Day 2020: De-Risking in the Era of Transparency

Daniel Fried, General Manager (GM) and Senior Vice President (SVP), EMEA and Worldwide Channels, Veeam explains the relevance of

Read More...

Allegion showcases its latest security solutions at Intersec 2020

Allegion exhibited its latest security solutions at Intersec 2020. With a strong focus on security around the door and

Read More...

Infoblox announces 5-city cybersecurity tour throughout MEA

Infoblox announced that it is hosting a 5-city cybersecurity tour throughout Middle East & Africa (MEA) under the theme

Read More...

Join Our Newsletter!

Love SecurityMEA? We love to tell you about our new stuff. Subscribe to newsletter!

Mobile Sliding Menu