CVE-2024-43532|Microsoft Remote Registry Service特权提升漏洞(POC)
CVE-2024-43532|Microsoft Remote Registry Service特权提升漏洞(POC)
alicy 信安百科 2024-11-02 17:48
0x00 前言
Microsoft Remote Registry Service(远程注册表服务)是Windows操作系统中的一个服务,允许远程用户通过网络访问和修改计算机上的注册表。
0x01 漏洞描述
漏洞源于Microsoft Remote Registry客户端在SMB传输不可用的情况下回退到 RPC(远程过程调用)认证时,切换到较旧的协议(如TCP/IP)并采用弱认证级别(RPC_C_AUTHN_LEVEL_CONNECT),该级别无法验证通信的完整性或来源,攻击者可利用该缺陷,通过拦截NTLM 身份验证握手并将其中继到其他服务(如ADCS),实现 NTLM 中继攻击,进而可能创建域管理员账户或接管整个域。
0x02 CVE编号
CVE-2024-43532
0x03 影响版本
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 11 Version 24H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
0x04 漏洞详情
POC:
https://github.com/akamai/akamai-security-research/tree/main/PoCs/cve-2024-43532
0x05 参考链接
https://www.akamai.com/blog/security-research/winreg-relay-vulnerability
https://github.com/akamai/akamai-security-research/tree/main/PoCs/cve-2024-43532
推荐阅读:
CVE-2024-21378|Microsoft Outlook远程代码执行(RCE)漏洞(POC)
CVE-2024-21413|Microsoft Outlook 远程代码执行漏洞(需结合其他漏洞)
CVE-2024-9264|Grafana SQL表达式允许远程代码执行(POC)
Ps:国内外安全热点分享,欢迎大家分享、转载,请保证文章的完整性。文章中出现敏感信息和侵权内容,请联系作者删除信息。信息安全任重道远,感谢您的支持
!!!
本公众号的文章及工具仅提供学习参考,由于传播、利用此文档提供的信息而造成任何直接或间接的后果及损害,均由使用者本人负责,本公众号及文章作者不为此承担任何责任。