Home / Huawei / Windows 10 Systems Prone To ‘Full Compromise’ Due To Nasty Huawei Driver

Windows 10 Systems Prone To ‘Full Compromise’ Due To Nasty Huawei Driver

Third party kernel drivers are often a headache for the consumer electronics vendors as the complete control on the integrity of the system can’t be ensured. The same applies to Microsoft and its Windows 10 operating system.

In an official blog post, Microsoft has outlined a massive security flaw present in a device management driver developed by China-based tech giant Huawei. The flaw has already been patched but it’s important to highlight how it allowed local privilege escalation of a massive scale.

Microsoft was able to spot the flaw in Huawei’s MateBook line of laptops with the help of its new kernel sensors that were implemented in the OS as a part of Windows 10 October 2018 Update; it’s also called Windows 10 Version 1809.

windows 10 priviledge escalation huawei matebook

These sensors were chiefly put in place to prevent NSA-created backdoors like DOUBLEPULSAR, which was also exploited by  WannaCry ransomware. The company found that Huawei’s PC Manager allowed an attacker to develop a notorious instance of MateBookService.exe and gain escalated privileges.

Moreover, the driver also allowed a low privilege code to gain read-write permissions and even modify kernel as well, resulting in complete compromise. While the first flaw was CVE-2019-5241, this second instance was assigned CVE-2019-5242.

You can know more about how Redmond reverse-engineered Huawei’s driver and unearthed this privilege escalation flaw.

Also Read: Windows 10 PCs Prone To ‘Full Compromise’ Due To Huawei PC Driver

susbcribe-to-fossbytes



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.

x

Check Also

fossbyte-fevicon-new-logo

Intel CPU Exploit Zombieload Uses Hyperthreading To Steal Data

The latest Intel CPU exploit termed Zombieload is a speculative execution side-channel attack. It uses ...