Kevin Beaumont (@GossiTheDog) just published an excellent overview of the newly touted ALPC zero-day in Task Scheduler. Complete with working exploit
[See the full post at: Details on the Task Scheduler ALPC zero-day]
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Details on the Task Scheduler ALPC zero-day
Home » Forums » Newsletter and Homepage topics » Details on the Task Scheduler ALPC zero-day
- This topic has 18 replies, 11 voices, and was last updated 6 years, 8 months ago.
AuthorTopicViewing 10 reply threadsAuthorReplies-
dportenlanger
AskWoody Lounger -
JCCWsusser
AskWoody Lounger -
OscarCP
MemberAugust 28, 2018 at 12:06 pm #213673According to Woody’s in the Home Page: ” Nothing to worry about yet, but expect to see a fix for all versions of Windows before too long. ”
Looking into this, I find the following at Born’s:
” Will Dormann, a vulnerability analyst at the CERT/CC, tested the exploit and confirmed that it “works well in a fully-patched 64-bit Windows 10 system.”
About the vulnerability
He also prepared a vulnerability note detailing the flaw: a local privilege escalation vulnerability in the Advanced Local Procedure Call (ALPC) interface used by the Microsoft Windows task scheduler, the exploitation of which can allow a local user to obtain SYSTEM privileges on the target computer.“The CERT/CC is currently unaware of a practical solution to this problem,” he wrote, and later remarked on Twitter that he’s currently unaware of any workarounds.
UK-based security architect Kevin Beaumont also confirmed the exploit works.
The vulnerability has yet to receive a CVE number but has bee awarded a CVSS score that puts it in the “medium” risk category.
According to The Register, a Microsoft spokesperson acknowledged the existence of the vulnerability and said the company will “proactively update impacted advices as soon as possible”. ” (Emphasis is mine.)
“Advices”? Typo, or impenetrably opaque jargon?
So, does this bit of malware threaten users of all versions of Windows, those still supported in particular? Please, perhaps someone could confirm this? Thanks.
Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).
MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV4 users thanked author for this post.
-
gborn
AskWoody_MVPAugust 28, 2018 at 3:58 pm #213752Currently I’m a bit confused. I tried to execute the commands, the PoC author has shown within his video shipped with the PoC archive. Using a standard user account in 64 bit Win 7, I wasn’t able to grant SYSTEM privileges to a process like Notepad. Maybe it’s my fault and I made an error or overlooked something.
The fact, that Microsoft didn’t release an emergency patch and addresses the next patchday is probably an indication, that the 0-day exploit isn’t that critical. But that’s my personal opinion. We will wait and see.
Ex Microsoft Windows (Insider) MVP, Microsoft Answers Community Moderator, Blogger, Book author
https://www.borncity.com/win/
4 users thanked author for this post.
-
-
Noel Carboni
AskWoody_MVPAugust 28, 2018 at 7:53 pm #213784I’m imagining the mitigations for this could cause things that have always worked to stop working.
It has always been common practice to start things that need privilege via the Task Scheduler when a user logs in. I have, for example a program called WizMouse that starts when I log in and intercepts mouse wheel events and sends them to whatever application the mouse is over (and it actually works better than the Windows facility to do the same).
I smell a potential loss of functionality in the name of security here. I definitely need to learn more detail about this one.
As far as being vulnerable to this… Just be careful what you run – as always. This isn’t something where someone on the other side of the world can magically reach into your computer and make things go wrong. NEVER assume that you can just blithely run software (e.g., malware) on your computer and somehow it will protect itself. That’s always been a pipe dream and it always will be.
-Noel
1 user thanked author for this post.
-
AlexEiffel
AskWoody_MVPAugust 28, 2018 at 10:37 pm #213803
-
-
anonymous
Guest -
santino
AskWoody Lounger -
GoneToPlaid
AskWoody Lounger -
anonymous
GuestAugust 29, 2018 at 9:33 am #213872Kudos (I mean — give points) to both santino and GoneToPlaid.
If an important part of the demonstratable attack code involves the XPS driver, and if I don’t use the XPS driver at all, would I be better off simply removing the XPS driver (and anything else XPS-related which I can find)?
HMcF
Win7 Pro SP1 64-bit, Group B until Dec 2018, later Group W. In process of switching to Linux Mint.
1 user thanked author for this post.
-
GoneToPlaid
AskWoody LoungerAugust 29, 2018 at 9:14 pm #214012I just uninstalled XPS Services and XPS Viewer from my Win7 computer, with no ill effects, even though there was a popup which warned that some services possibly would stop working or that some default settings would be changed. When you install Win7 the default printer is the XPS printer. I don’t think that I ever used XPS even once during many years. I didn’t even have to reboot after uninstalling these two Windows components.
-
anonymous
Guest
-
-
AlexEiffel
AskWoody_MVPSeptember 6, 2018 at 12:16 pm #215649“The recently discovered Windows zero-day – which still doesn’t have a patch – has been used in the wild for the last week, with an active info-stealing campaign emerging just two days after its disclosure on Twitter.”
https://threatpost.com/active-spy-campaign-exploits-unpatched-windows-zero-day/137237/
-
b
AskWoody_MVPSeptember 6, 2018 at 12:49 pm #215665From the bottom line of that article; CERT/CC has added a temporary workaround sometime within the last week:
Set ACLs on the C:\Windows\Tasks directory
Karsten Nilsen has provided a mitigation for this vulnerability. Caution: This mitigation has not been approved by Microsoft. However, in our testing it does block exploits for this vulnerability. It also appears to let scheduled tasks to continue to run, and users can continue to create new scheduled tasks as necessary. However, this change will reportedly break things created by the legacy task scheduler interface. This can include things like SCCM and the associated SCEP updates. Please ensure that you have tested this mitigation to ensure that it does not cause unacceptable consequences in your environment.To apply this mitigation, run the following commands in an elevated-privilege prompt,:
icacls c:\windows\tasks /remove:g “Authenticated Users”
icacls c:\windows\tasks /deny system:(OI)(CI)(WD,WDAC)Note that when a fix is made available for this vulnerability, these changes should be undone. This can be done by executing the following commands:
icacls c:\windows\tasks /remove:d system
icacls c:\windows\tasks /grant:r “Authenticated Users”:(RX,WD)
(It seemed like a worthwhile protection to me, so I’ve done this on my computers.)
2 users thanked author for this post.
-
anonymous
GuestSeptember 6, 2018 at 1:06 pm #215669At this point this is a threat to all supported Windows versions (7, 8, 8.1 and various 10’s), so my guess would be those still on xp can breath easy for a change…
I d not understand why placing a Notepad dll in the System works as the starting point of a multi phase attack, and perhaps someone could explain that here. But more importantly: is my assumption that, at least for now, being careful as usual when receiving email from a supposedly trusted source with an incongruent ‘subject’ header and leaving it unopened and trashing it instead will make this much less of a threat?
The article also mentions that fake updates to “Google applications” as a point of entry. Does this include the browser Chrome, that updates itself automatically? Thanks.
1 user thanked author for this post.
-
b
AskWoody_MVPSeptember 6, 2018 at 2:09 pm #215709Notepad was the end of the proof of concept, not the start; it was just used as a sample executable to be launched with system privileges due to the flaw.
GoogleUpdate.exe is the program run by task scheduler to automatically update the Chrome browser and other applications, but it is not an entry point for this exploit so there are no fake updates.
The current attack replaces that program with a malicious version which will then run automatically. It does appear to start with an “unpaid invoice” email attachment so far.
2 users thanked author for this post.
-
-
b
AskWoody_MVPSeptember 11, 2018 at 7:05 pm #216911Patched today for all current versions of Windows:
CVE-2018-8440 | Windows ALPC Elevation of Privilege Vulnerability
4 users thanked author for this post.
Viewing 10 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Discover the Best AI Tools for Everything
by
Alex5723
2 hours, 49 minutes ago -
Edge Seems To Be Gaining Weight
by
bbearren
5 hours, 8 minutes ago -
Rufus is available from the MSFT Store
by
PL1
13 hours, 47 minutes ago -
Microsoft : Ending USB-C® Port Confusion
by
Alex5723
15 hours, 57 minutes ago -
KB5061768 update for Intel vPro processor
by
drmark
1 hour, 50 minutes ago -
Outlook 365 classic has exhausted all shared resources
by
drmark
14 hours, 8 minutes ago -
My Simple Word 2010 Macro Is Not Working
by
mbennett555
11 hours, 42 minutes ago -
Office gets current release
by
Susan Bradley
14 hours, 19 minutes ago -
FBI: Still Using One of These Old Routers? It’s Vulnerable to Hackers
by
Alex5723
2 days, 4 hours ago -
Windows AI Local Only no NPU required!
by
RetiredGeek
1 day, 12 hours ago -
Stop the OneDrive defaults
by
CWBillow
2 days, 5 hours ago -
Windows 11 Insider Preview build 27868 released to Canary
by
joep517
2 days, 15 hours ago -
X Suspends Encrypted DMs
by
Alex5723
2 days, 17 hours ago -
WSJ : My Robot and Me AI generated movie
by
Alex5723
2 days, 17 hours ago -
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
by
Alex5723
2 days, 18 hours ago -
OpenAI model sabotages shutdown code
by
Cybertooth
2 days, 18 hours ago -
Backup and access old e-mails after company e-mail address is terminated
by
M W Leijendekker
2 days, 7 hours ago -
Enabling Secureboot
by
ITguy
2 days, 14 hours ago -
Windows hosting exposes additional bugs
by
Susan Bradley
3 days, 2 hours ago -
No more rounded corners??
by
CWBillow
2 days, 22 hours ago -
Android 15 and IPV6
by
Win7and10
2 days, 12 hours ago -
KB5058405 might fail to install with recovery error 0xc0000098 in ACPI.sys
by
Susan Bradley
3 days, 15 hours ago -
T-Mobile’s T-Life App has a “Screen Recording Tool” Turned on
by
Alex5723
3 days, 17 hours ago -
Windows 11 Insider Preview Build 26100.4202 (24H2) released to Release Preview
by
joep517
3 days, 12 hours ago -
Windows Update orchestration platform to update all software
by
Alex5723
4 days, 1 hour ago -
May preview updates
by
Susan Bradley
3 days, 12 hours ago -
Microsoft releases KB5061977 Windows 11 24H2, Server 2025 emergency out of band
by
Alex5723
3 days, 4 hours ago -
Just got this pop-up page while browsing
by
Alex5723
3 days, 17 hours ago -
KB5058379 / KB 5061768 Failures
by
crown
3 days, 14 hours ago -
Windows 10 23H2 Good to Update to ?
by
jkitc
2 days, 16 hours ago
Recent blog posts
Key Links
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 |
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.