A recently identified vulnerability in AnyDesk (CVE-2024-12754) enables attackers to escalate privileges on Windows systems by exploiting the software's handling of desktop background images. Security researcher Naor Hodorov, in collaboration with Trend Micro’s Zero Day Initiative, discovered that AnyDesk copies a user’s wallpaper to the directory with NT AUTHORITY\SYSTEM privileges. Attackers with low-level access can exploit this process by creating a file with the same name and using reparse points and symbolic links to redirect the copy operation to critical system files, such as SAM, SYSTEM, and SECURITY within Volume Shadow Copies. This technique allows unauthorized access to stored credentials and the potential for administrative privilege escalation. This vulnerability is particularly concerning due to its simplicity and the extensive use of AnyDesk for both personal and enterprise remote access. Although the attack requires technical knowledge, skilled threat actors could leverage it for advanced intrusions. The issue was responsibly disclosed to AnyDesk Software GmbH on July 24, 2024, and publicly revealed on December 19, 2024. In response, cybersecurity professionals recommend restricting access to AnyDesk on high-value systems, monitoring the directory for suspicious activity, and disabling Volume Shadow Copies if not essential. Organizations are advised to evaluate their security configurations and implement protective measures until a formal patch is released. As reliance on remote access tools continues to grow, this vulnerability underscores the importance of maintaining strong security practices and prompt updates. AnyDesk users, especially enterprise IT teams, should act swiftly to fortify their systems. Conducting regular security audits and enforcing strict privilege management are key steps in mitigating the risks posed by privilege escalation attacks. This incident serves as a reminder that even seemingly benign features, like background images, can be exploited if not properly safeguarded.
A large-scale phishing campaign has been identified leveraging RFQ (Request for Quotation) themed emails to distribute credential-stealing malware. Attackers disguise malicious HTM...
Two critical vulnerabilities in Progress ShareFile have been identified that can be chained to achieve pre-authentication remote code execution (RCE). Discovered by watchTowr resea...
The FBI has issued a warning highlighting potential security and privacy risks associated with widely used mobile applications developed by Chinese companies. These applications, a...