A critical local privilege escalation vulnerability has been discovered in MSI Center versions 2.0.36.0 and earlier, allowing low-privileged users to escalate their privileges on Windows systems.
This security flaw, tracked as CVE-2024-37726, stems from insecure file operations performed by the MSI Center application running with NT AUTHORITYSYSTEM privileges.
A low-privileged user creates a directory and sets an OpLock on a file within it.
While the OpLock is in place, the user moves the original file and creates a junction to a target file.
This allows the MSI Center application to overwrite or delete the target file with SYSTEM privileges.
Security researcher carsonchan12345 said that manipulating this process can allow an attacker to overwrite or delete critical system files, leading to a full system compromise.
MSI has addressed this vulnerability in version 2.0.38.0 of MSI Center, released on July 3, 2024.
Users are strongly advised to update to this latest version to mitigate the risk.
This incident highlights the importance of proper file system access controls and the potential dangers of applications running with elevated privileges.
Organizations and individual users should prioritize updating affected systems and conduct thorough security audits to identify and address similar vulnerabilities.
To verify if your MSI Center version is affected by this vulnerability, you should check the version number of your installed MSI Center application.
The vulnerability affects MSI Center versions 2.0.36.0 and earlier.
If your MSI Center version is 2.0.36.0 or earlier, your system is potentially vulnerable.
The vulnerability has been fixed in version 2.0.38.0, released on July 3, 2024.
Update MSI Center to the latest version if available.
If an update is not yet available, consider temporarily uninstalling or disabling MSI Center until an update is released.
Monitor MSI's official website or support channels for security advisories and updates.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 04 Jul 2024 03:40:17 +0000