How an attacker can misuse the Group Policy vulnerability

Group Policy settings are stored on Windows systems as Group Policy Objects (GPO) and they can be distributed by the domain admin over the network from the domain controller. In any case, Group Policy upgrades are not instant of course, and generally takes some time to engender over a network, which is the reason Windows incorporates a tool called GPUpdate.exe that users can run to request GPO upgrades from the domain controller as opposed to waiting for them.

Windows Systems

"Strangely enough, a Group Policy update can be requested physically by a local non-privileged user," the security CyberArk security scientists said in a blog entry.

"In this way, if you figure out how to discover a bug in the Group Policy update process, you can trigger it yourself whenever you need to - making a potential attack simpler."

The Group Policy upgrades are taken care of through a service called GPSVC that runs under the svchost.exe process, which handles many services in Windows. True to form, this service runs with the most elevated potential privileges, with regards to NT AUTHORITY\SYSTEM.

Group Policy updates can be connected to a machine, site, domain or organizational unit and the service will save them as a file called Applied-Object.xml, which is then renamed to the kind of object the policy applies to.

For instance, a policy on printers would be translated to Printers\Printers.xml.
The analysts found that GPO upgrades connected to an Organizational Unit - which focus on all users and PCs in the domain - are saved in a location on the PC under the %localappdata% index which is open to any local client.


Comments

Popular posts from this blog

The best 10 jobs new graduates are applying for, and what they pay

Cyberattack campaigns misusing COVID-19 with worldwide effect

Security skills for systems administrators to learn