CVE-2021-34484 was not fully patched by Microsoft as part of the August security updates.
On the 0patch platform, it became available a free unofficial patch (micropatch) that fixes a local privilege escalation vulnerability in the Windows User Profile Service, which, under certain conditions, allows attackers to elevate their privileges to the system level.
Vulnerability CVE-2021-34484 was not fully patched by Microsoft as part of the August scheduled security updates. However, only part of the vulnerability was fixed, for which the researcher Abdelhamid Naceri, who discovered it, submitted a PoC code.
Naseri later discovered that attackers could bypass Microsoft’s patch and, in some cases, elevate their privileges to the system level.
Fortunately, in order to exploit the exploit, hackers need to know the credentials of other users and first log in with them. In other words, the vulnerability is unlikely to be widely used in real-world cyberattacks.
However, there is some bad news. The issue affects all versions of Windows, including Windows 10, Windows 11, and Windows Server 2022, even if they have all the updates installed. The situation is aggravated by the fact that attackers only need a different domain to exploit the vulnerability, and administrators should take this into account.
Microsoft is aware of the possibility of circumventing its CVE-2021-34484 patch, and the company has promised to take appropriate action. In the meantime, she is working on fixing the problem, a free unofficial micropatch has appeared on 0patch for the following versions of Windows:
- Windows 10 v21H1 (32 and 64 bit) with all updates for October and November 2021
Windows 10 v20H2 (32 and 64 bit) with all updates for October and November 2021
Windows 10 v2004 (32-bit and 64-bit) with all updates for October and November 2021
Windows 10 (32-bit and 64-bit) with all updates for October and November 2021
Windows Server 2019 (64-bit) with all October and November 2021 updates.
To install the micropatch on the system, the administrator will first need to register an account with the 0patch service, and then install the 0patch agent. After starting the agent, the micropatch will be installed automatically (if the installation of patches is not blocked by custom corporate policies) without the need to reboot the device.
Although the vulnerability theoretically affects older versions of Windows, as explained by the co-founder of 0patch Mitja Kolsek, “their code is different, and the window for winning the race (concurrency uncertainty – ed.) Is so short that it is most likely impossible for them take advantage of “.
The vulnerability was identified as CVE-2021-33742. The video below shows a micropatch fixing it in action.
Can Microsoft Defender antivirus be disabled in Windows 11?
microsoft defender has reached a spectacular level of maturing with windows 10. What started as a basic malware protection more serious, it has become one of the best antiviruses on the market, with the advantage that it is free, lightweight, and is already included and activated with the operating system. However, there are times that we may be interested in deactivating it, but is it possible to do it with Windows 11?
When we install a third-party antivirus, Microsoft Defender is disabled. However, there may be times when it is not deactivated properly, or there may be times when we simply want to temporarily disable the antivirus to install something that is detected as a false positive. It is also possible that, on a weak computer, Microsoft Defender consumes a lot of resources; especially when booting the system. There are lighter options, or if we don’t have the internet connected device, we may not even need the antivirus.
Windows 11 allows you to disable antivirus
In the Security section of Windows 11, luckily, we can disable many antivirus functions, including Real-time Protection, which is the one that usually causes problems when it comes to detecting false positives in files that we know are safe. This protection can only temporarily deactivate, but the rest of the protection modules can be permanently disabled.
So, effectively, we can temporarily disable the protection in Windows. To do this, we go to Settings in Windows 11, and there we enter the Privacy security tab. In there, let’s windows security. Once there, click on the option that says Antivirus and threat protection. In there, we just have to go to the part of managing the configuration of Real-time protection, and disable it.
It can also be permanently disabled
This deactivation is temporary, so if we want to deactivate it completely, we will have to go to the Local Group Policy Editor. To go to this section, it is necessary to disable the function of Tamper Protection within the same section where real-time protection is temporarily disabled.
To do this, we look for theLocal Group Policy Editor«, or gpedit.msc. In there, let’s Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus. Once we get there, we look for the option «Disable Microsoft Defender Antivirus«. We double click, and we give Enabled. Now we just have to restart, and we will have the Windows 10 antivirus permanently disabled.
These are the best options we have for disable Microsoft Defender in Windows 11. Another option is to use programs like Defender Control or Configure Defender. This type of program allows you to manage a multitude of settings directly from the program and with a couple of clicks without having to navigate through the system settings.
ALL LG Smart TVs can be hacked through the Internet and DTT
The SmartTV They have all kinds of protection mechanisms against vulnerabilities. Some even integrate antivirus to prevent malware from entering them, and all their apps are carefully analyzed. However, they always end up discovering vulnerabilities, so some people prefer not to connect tvs to the internet. The problem is that they got to hack some remotely without even having them connected to the Internet.
The vulnerability has been discovered by the hacker David Buchanan, also know as retr0id. This fault consists of remote code execution via DVB-T standard. In other words, the broadcast of the exploit is carried out through the signal that reaches DTT through the antenna socket. Needless nor that the TV is connected to the Internet in order to exploit the vulnerability.
It hacks through DVB-T and HbbTV
The error consists in executing scripts to generate a DVB-T transmission with metadata from HbbTV, the standard used LovesTV. With these scripts, a web page is loaded on top of the video feed, containing a V8 n-day exploit. Buchanan says that now all he needs to do is find another vulnerability that allows him to escalate privileges on the TV for even more absolute control.
The exploit works on a 2019 LG Smart TVs. Until now, this type of attack required the Smart TV to be connected to the Internet, but now all it takes is for it to be turned on. Buchanan says it may also be possible to hack a TV that’s turned off, but he needs to keep testing.
The bug is still unpatched on LG TVs, whose latest update was released last January 13th. The vulnerability has been published on January 14, so LG has not had time to fix it yet. Although the bug has been exploited on a 2019 TV, Buchanan says the bug can be exploited on 2020 and 2021 models. However, these models use newer versions of Chrome as their browser, so an n-day exploit will be needed. different.
In the video that Buchanan has uploaded to his Twitter account, you can see how you can get almost total control of the TV, showing notifications, messages, and even choosing the video you want to play on it.
RCE over DVB-T
This is a 2019 model LG TV pic.twitter.com/o724k3K3IE
— David Buchanan (@David3141593) January 14, 2022
The vulnerability demolishes all those comments that say that “if you are concerned about your privacy, do not connect the TV to the Internet”. Now, it is possible to hack LG TVs without them being connected to the Internet. However, the flaw can be mitigated by disabling HbbTV’s autostart feature, although Buchanan says that many other vulnerabilities remain in DVB.
I just got DSMCC Carousels working.
That means the exploit still fires even if the TV is not connected to the internet. The entire exploit is served over the airwaves.
Everyone who said “just don’t connect it to the internet” can shut up now 😛 https://t.co/KSYMsdVmqo
— David Buchanan (@David3141593) January 14, 2022
Any LG TV can now be rooted
With this exploit it is possible root lg tv. There is a tool called RootMyTV, which makes it easier to take advantage of the vulnerability to install the homebrew channel on a TV after rooting it. Thanks to this, it is possible to install unauthorized applications and created by the community, such as moonlit to remotely play your PC games (since webOS does not have the Steam Link app), YouTube with enhanced features, RetroArch to play emulators, and many more to come in the future.
After the vulnerability, they have updated RootMyTV to the version 2.0, where, just by entering the website of rootmy.tv from an LG television, it is already possible root it to install apps on it. All current LG models can be rooted with this method, including those updated to version 04.30.57 released this week. The automatic system updates are disabled after rooting in case there is any problem with the updates. In case you want unroot, you just have to do a factory-reset of the TV to return it to the factory settings, so the method is quite safe.
— David Buchanan (@David3141593) January 14, 2022
Security problems detected in the official app of the Olympic Games
On the eve of a new edition of the Winter Olympics that will take place in Beijing, China, during the next month, a series of security problems were detected in an official application of the sporting event, which is expected to be widely used by athletes and reporters who will attend the instance.
Citizen Lab, an Internet security firm, said in a report that the MY2022 application has serious deficiencies in its encryption, a condition that would make users’ confidential data, plus any other data communicated through said app, vulnerable to being pirated. Other important user data in the app was not encrypted at all, according to the report.
Olympic committee app has vulnerabilities
The above implies that the data transmitted through the application could be read by Chinese Internet service providers or telecommunications companies through Wi-Fi access points in hotels, airports and Olympic venues.
Specifically, according to citizen lab report, the MY2022 app shares information directly with some Chinese companies such as Huawei, Xiaomi, Oppo, Vivo, Meizu, Tencent, Weibo, AutoNavi and iFlytek, varying the type of data according to each case. Also, the presence of invalid SSL certificates was reported, a condition that hinders the encryption of sensitive information.
The report indicates that the application is mandatory for those attending the sporting event. Without going too far, the official guide of the International Olympic Committee instructs attendees to download the application before visiting China. However, the IOC issued a statement yesterday, noting that this smartphone app was not mandatory. The IOC also rejected the Citizen Lab report, saying that two independent cybersecurity testing organizations had found no critical vulnerabilities with the app.
China is requiring all international Olympics attendees, including coaches and journalists, to log into a health monitoring system at least 14 days before they leave. They can use the app to do this, or they can still log in through a web browser on a PC. The app allows its users to submit required health information on a daily basis and is part of China’s aggressive effort to manage the coronavirus pandemic as it hosts the games, which begin on February 4. The app also has chat features, file transfers, weather updates, tourist recommendations, and GPS navigation.
Given the environment with these technologies, many countries are advising their athletes not to bring their normal smartphones to China, but to bring temporary phones, or burners, that do not store any sensitive personal data, according to news reports.
Apps to watch DTT programming and pay television
There are many mobile applications that allow us to consult the programming of DTT and pay television to keep up...
Tesla can now produce its own headphones and speakers
Tesla now has the ability to sell audio equipment under its own brand. The automaker filed for a trademark in...
A large number of iPhone 13 owners complain about the pink screen, slowdowns and reboots
In Chinese social networks, a large number of iPhone 13 users report that the entire screen of the smartphone is...
The top Intel Arc Alchemist graphics card on the DG2-512EU GPU turned out to be faster than the GeForce RTX 3070 Ti in the benchmark
In the SiSoftware Sandra database, Intel’s top 3D accelerator of the Arc Alchemist line based on the DG2-512EU graphics processor...
Phones7 days ago
The first radical change in the iPhone for many years: iPhone 14 Pro and iPhone 14 Pro Max smartphones will receive a camera with a resolution of 48 megapixels
News7 days ago
19-year-old hacker claims to have taken control of 25 Tesla cars around the world
Phones7 days ago
Redmi will have a smartphone with an under-screen fingerprint scanner this year, and Redmi K50 on the Dimensity 9000 platform will be released in March
Electric Cars7 days ago
Renault first showed the 200-horsepower Austral hybrid crossover