Exploit released for new Windows Server "WinReg" NTLM Relay attack
Proof-of-concept exploit code is now public for a vulnerability in Microsoft's Remote Registry client that could be used to take control of a Windows domain by downgrading the security of the authentication process.
The vulnerability is tracked as CVE-2024-43532 and takes advantage of a fallback mechanism in the Windows Registry (WinReg) client implementation that relies on old transport protocols if the SMB transport is not present.
An attacker exploiting the security issue could relay NTLM authentication to Active Directory Certificate Services (ADCS) to obtain a user certificate for further domain authentication.
The flaw affects all Windows server versions 2008 through 2022 as well as Windows 10 and Windows 11.
Vulnerability and exploitation details
CVE-2024-43532 stems from how Microsoft's Remote Registry client handles RPC (Remote Procedure Call) authentication during certain fallback scenarios when SMB transport is unavailable.
When this happens, the client switches to older protocols like TCP/IP and uses a weak authentication level (RPC_C_AUTHN_LEVEL_CONNECT), which doesn't verify the authenticity or integrity of the connection.
An attacker could authenticate to the server and create new domain administrator accounts by intercepting the NTLM authentication handshake from the client and forwarding it to another service, such as the (ADCS).
Successfully exploiting CVE-2024-43532 results into a new way to carry out a NTLM relay attack, one that leverages the WinReg component to relay authentication details that could lead to domain takeover.
Some threat actors have used NTLM relay attack methods in the past to take control of Windows domains. One example is the LockFile ransomware gang, who targeted organizations various organizations in the U.S. and Asia using PetitPotam shortly after it was discovered.
The vulnerability was discovered by Akamai researcher Stiv Kupchik, who disclosed it to Microsoft on February 1. However, Microsoft dismissed the report on April 25 "as documentation issue."
In mid-June, Kupchik resubmitted the report with a better proof-of-concept (PoC) and explanation, which led to Microsoft confirming the vulnerability on July 8. Three months later, Microsoft released a fix.
The researcher has now released a working PoC for CVE-2024-43532 and explained the exploitation process, from creating a relay server to obtaining a user certificate from the target, during the No Hat security conference in Bergamo, Italy.
Akamai's report also provides a method to determine if the Remote Registry service is enabled on a machine as well as a YARA rule to detect clients that use a vulnerable WinAPI.
The researchers also recommend using Event Tracing for Windows (ETW) to monitor for specific RPC calls, including those related to the WinReg RPC interface.
source: BleepingComputer
Free security scan for your website
Top News:
Hackers now use AppDomain Injection to drop CobaltStrike beacons
August 24, 2024New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks
November 12, 2024Attackers are exploiting 2 zero-days in Palo Alto Networks firewalls (CVE-2024-0012, CVE-2024-9474)
November 18, 2024CWE top 25 most dangerous software weaknesses
November 21, 2024Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor
November 21, 2024