DEV Community

Cover image for PhantomRPC: Architectural Windows Flaw Allows Local Privilege Escalation
BeyondMachines for BeyondMachines

Posted on • Originally published at beyondmachines.net

PhantomRPC: Architectural Windows Flaw Allows Local Privilege Escalation

Summary

A newly identified architectural flaw in Windows RPC, called PhantomRPC, allows attackers to escalate privileges to SYSTEM by spoofing unavailable RPC servers. Microsoft has not released a patch, classifying the vulnerability as moderate because it requires existing impersonation privileges.

Take Action:

If you run Windows servers or workstations, enable ETW-based RPC monitoring to detect suspicious RPC_S_SERVER_UNAVAILABLE errors and restrict SeImpersonatePrivilege to only essential service accounts. Also keep services like TermService enabled so attackers can't spoof those unavailable endpoints.


Read the full article on BeyondMachines


This article was originally published on BeyondMachines

Top comments (0)