A privilege escalation vulnerability impacting all Windows versions that can let threat actors gain domain admin privileges through an NTLM relay attack has received unofficial patches after Microsoft tagged it as "won't fix."

The vulnerability, dubbed RemotePotato0 Sentinel LABS researcher Antonio Cocomazzi and independent researcher Andrea Pierini, who found it and disclosed it in April 2021, is a zero-day flaw (according to Microsoft's own definition) that is yet to receive a CVE ID after Redmond refused to issue a fix.

It makes it possible for attackers to trigger authenticated RPC/DCOM calls and relay the NTLM authentication to other protocols, which allows them to elevate privileges to domain administrator, likely allowing full domain compromise.

"It allows a logged-in low-privileged attacker to launch one of several special-purpose applications in the session of any other user who is also currently logged in to the same computer, and make that application send said user's NTLM hash to an IP address chosen by the attacker," 0patch co-founder Mitja Kolsek explained in a blog post sharing info on free micropatches released to block RemotePotato0 exploitation on impacted servers.

"Intercepting an NTLM hash from a domain administrator, the attacker can craft their own request for the domain controller pretending to be that administrator and perform some administrative action such as adding themselves to the Domain Administrators group."

While the attackers would have to trick home users with admin privileges into logging in at the time of the attack for successful exploitation.

However, as Kolsek said, this is a lot easier on Windows Server systems since multiple users are logged simultaneously, including administrators, thus eliminating the social engineering requirement.

A video demo of the RemotePotato0 micropatch in action is embedded below.

Admins told to disable NTLM or correctly configure servers

The Windows NT (New Technology) LAN Manager (NTLM) authentication protocol is used to authenticate remote users and to provide session security when requested by app protocols.

Kerberos has superseded NTLM, the current default auth protocol for domain-connected devices for all Windows 2000 and later.

Despite this, NTLM is still in use on Windows servers, allowing attackers to exploit vulnerabilities like RemotePotato0 designed to bypass NTLM relay attack mitigations.

Microsoft told the researchers that Windows admins should either disable NTLM or configure their servers to block NTLM relay attacks using Active Directory Certificate Services (AD CS).

The researchers "hope that MS reconsider their decision not to fix this serious vulnerability" since RemotePotato0 can be exploited without requiring the target's interaction by relaying authentication to other protocols, unlike similar NTLM relay attack techniques using bugs like CVE-2020-1113 and CVE-2021-1678.

Free patch available until Microsoft provides one

Until Microsoft decides to issue security updates for this vulnerability, the 0patch micropatching service has released free unofficial patches (known as micropatches).

0patch has developed the micropatches using information shared by Cocomazzi and Pierini in their April 2021 report.

The unofficial patches for RemotePotato0 are available for all Windows versions from Windows 7 to the latest Windows 10 version and from Windows Server 2008 to Windows Server 2019.

To install the micropatch on your system, you will first have to create a 0patch account and then install the 0patch agent.

After launching the agent, the micropatch will be applied automatically without a restart if you haven't enabled any custom patching enterprise policy to block it.

Related Articles:

Windows Kernel bug fixed last month exploited as zero-day since August

Microsoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEs

Windows 11, Tesla, and Ubuntu Linux hacked at Pwn2Own Vancouver

Windows KB5035849 update failing to install with 0xd000034 errors

Microsoft: Windows 11 “invites” coming to more Windows 10 Pro PCs