Skip to content

No Patch for New PhantomRPC Privilege Escalation Technique in Windows

A fake RPC server can be used to listen for RPC requests and impersonate the target service to elevate privileges to System. The post No Patch for New PhantomRPC Privilege Escalation Technique in Windows appeared first on SecurityWeek.

A vulnerability in the Windows Remote Procedure Call (RPC) mechanism allows attackers to elevate their privileges to System, Kaspersky reports.

The local privilege escalation issue potentially affects all Windows versions and abuses another legitimate Windows mechanism, where processes are allowed to impersonate other processes to perform specific actions.

The root cause of the security defect, which Kaspersky researcher Haidar Kabibo named PhantomRPC, is an architectural weakness, potentially turning any process that depends on RPC into a possible escalation path.

Source: https://www.securityweek.com/no-patch-for-new-phantomrpc-privilege-escalation-technique-in-windows/

Related breach coverage