Windows 10: Exploit code released for zero-day vulnerability

Code for an exploit that exploits a zero-day vulnerability in Windows 10 has now been released to GitHub by a security researcher called SandboxEscaper . The vulnerability is designed to allow unauthorized extension of user rights, potentially allowing an attacker to take complete control of a system. The error itself should be in the process of Windows Task Scheduler .

Thus, an attack requires a specially crafted job file. It causes the Task Scheduler to process access permissions on certain files incorrectly. As a result, a hacker can execute code that is actually restricted to the locally logged-on user with administrator privileges.

The vulnerability has only been tested and confirmed on Windows 10 32-bit. According to ZDNet USA colleagues, the zero-day vulnerability should affect all versions of Windows – including Windows XP and Server 2003. However, the exploit may need to be adapted to other OS versions. A video is also available on Twitter showing how the vulnerability can be exploited.

SandboxEscaper is known to publish vulnerabilities in Windows without informing Microsoft in advance. Typically, security researchers work with manufacturers of the products and disclose details about security vulnerabilities only after a patch has been released to prevent endangering users. Only after a “reasonable” deadline, usually 90 days, some researchers and security providers go public without waiting for a fix from the manufacturer.

In 2018, SandboxEscaper surprised Microsoft with a total of four zero-day gaps, all of which allowed for an expansion of user rights. The software company usually eliminated the vulnerabilities within one to two months. In addition, only one of the four vulnerabilities was later used for a malware campaign.

Microsoft has not yet commented on the researcher’s recent “discovery.” The next regular Patchday for Windows will take place on June 11th.

SAP HANA now also on VMware vSphere 5.5

VMware and SAP release SAP HANA Platform on VMware vSphere 5.5 and are now rolling out the new version to users. vSphere is an important part of the vCloud virtualization solution that helps organizations better use their IT environment. With HANA certification on VMware vSphere, users now have even more flexibility.

vSphere is available for SAP HANA appliances or HANA datacenter solutions on certified hardware for Linux and Windows. Users can use up to 1TB of storage and 32 physical or 64 virtual processor cores per vSphere instance. As system management, HANA supports vSphere vMotion, Distributed Resource Scheduler (DRS), and VMware High Availability (HA).

“Together with VMware, we can now enable users to run mission-critical applications in virtualized environments, and accelerate the transition to software-defined data centers and, of course, the cloud,” commented newly-appointed SAP CEO Bernd Leukert.

Pat Gelsinger, CEO, VMware commented: “Our users are transforming their IT infrastructure from a physical environment to a software-defined architecture. They are looking for a solution that ensures agility, availability, elasticity, efficiency and control for the most critical and demanding enterprise environments. ”

In addition, the two companies will continue to work together to provide other capabilities of SAP HANA in VMware virtualized environments. As Bob Goldsand of Bob Goldsand, Staff Partner Architect, Global Strategic Alliances at VMware points out in a blog , this certification is the result of three years of combined testing. The test team put special emphasis on the fact that really no errors occur during operation.

One of the first pilot customers is Mercedes-AMG. “Mercedes-AMG today uses SAP HANA and VMware vSphere 5.5 with a 1TB storage configuration to accelerate the transition to the software-defined data center,” said Reinhard Breyer, CIO of Mercedes-AMG. Reinhard could simplify the operation in the data center by the virtualization with VMware.

Leave a Reply

Your email address will not be published. Required fields are marked *