Fileless UAC Bypass in Windows Store Binary

I’m not quite sure what you are trying to say. This exploit is like being able to sudo without a prompt and user notification (still need to be in the sudoers file).

This may not be a privilege escalation on the user account level, but it allows an attacker to switch from a non-privileged context into administrative context. Sure it’s not as impressive as going from user to root, but it’s a bypass allowing for stealth elevation.

It may not be a shocker, but it certainly is far from being trivial either.

Leave a Reply

Your email address will not be published. Required fields are marked *