RIP RegPwn
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,了解主要内容。 文章主要讲的是MDSec发现了一个Windows系统的提权漏洞,叫做RegPwn。这个漏洞影响了多个版本的Windows系统,包括Windows 10、11和一些服务器版本。漏洞是通过Windows的辅助功能特性来实现的,攻击者可以利用这个漏洞在系统中提升权限到SYSTEM级别。 接下来,文章详细描述了漏洞的工作原理,涉及到注册表的操作和进程之间的交互。攻击者通过创建符号链接和使用机会锁(oplock)来触发漏洞,最终实现任意注册表键的写入。 最后,文章提到MDSec已经向微软报告了这个漏洞,并且微软已经在最近的补丁星期二中修复了它。此外,他们还提供了概念验证代码和详细的利用步骤。 现在我需要把这些信息浓缩到100字以内。重点包括:MDSec发现RegPwn漏洞、影响范围、利用方式(辅助功能和注册表)、攻击者如何提升权限到SYSTEM、微软已修复以及提供POC代码。 确保语言简洁明了,不使用复杂的术语,直接描述关键点。 </think> MDSec发现了一个名为RegPwn的Windows提权漏洞,影响Windows 10/11及多版本服务器系统。该漏洞利用辅助功能特性中的注册表配置,在用户上下文中创建符号链接并触发机会锁(oplock),最终实现SYSTEM权限提升。微软已修复该漏洞(CVE-2026-24291),MDSec提供了概念验证代码以展示其利用过程。 2026-3-13 15:26:3 Author: www.mdsec.co.uk(查看原文) 阅读量:6 收藏

13th March 2026

As part of MDSec’s R&D work, we often discover vulnerabilities and develop exploits to support our red team engagements. When researching widely used software, it is often only a matter of time before the same vulnerability is discovered by other researchers and reported to the vendor. Two weeks ago we outlined an that we had been leveraging in red teams but decided to report to the vendor ourselves.

Ironically, today we’re documenting another Elevation Of Privilege vulnerability that was so elegant in its indicators, we kept it internal and used with great success across red team engagements since January 2025. For what will become obvious reasons, we named this vulnerability RegPwn and it affected Windows 10 and 11, as well as Windows Server 2012, 2016, 2019, 2022, and 2025. This vulnerability was fixed this Patch Tuesday and we believe is tracked as CVE-2026-24291.

Description

The Windows Accessibility features are a collection of built-in capabilities in Microsoft Windows designed to make the operating system usable for people with disabilities or specific usability needs. These features provide alternative ways to interact with the system through keyboard input, voice, screen narration, visual adjustments, and assistive technologies.

The list of installed accessibility features is defined in following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\ATs

When some of these Windows accessibility features are used (ex: narrator, on-screen keyboard etc) the following registry key is created and grants full control to a low privilege user:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\<accessibility feature name>

This registry key will also be populated with the configuration related to accessibility feature used, in this example On Screen Keyboard:

These configurations are then copied to the following registry key in HKLM which is created by winlogon.exe during the login process and grants the logged in user write privileges:

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\Session<session id>\ATConfig

Windows accessibility features execute in the user context, albeit with High Integrity due to the UIAccess flag. The obvious question then becomes, how can this be abused to obtain SYSTEM privileges?

The answer lies in the Secure Desktop. The primary distinction between the secure desktop and the user desktop is that only trusted processes running as SYSTEM are permitted to execute there. In other words, no processes running with the user’s privileges are present on the secure desktop.

When a user creates a secure desktop session by either locking the workstation or running process via the “Run as administrator” option two atbroker.exe processes are started, one running in the current user context and one running as the SYSTEM account.

The ATbroker.exe process running as the low privileged user will once again copy all configurations from HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\osk

to

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\Session<session id>\ATConfig\osk

The ATbroker.exe process running as the SYSTEM account will proceed to copy values from HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\Session1\ATConfig\osk

to

HKU\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\osk

Finally an instance of the osk.exe process running as SYSTEM is started and copies values from HKU\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\osk

to

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\Session<session id>\ATConfig\osk

As the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\Session<session id>\ATConfig\osk registry key is writable by the current user and the configuration values are copied from a user-controlled registry location, this behaviour can be abused to achieve an arbitrary registry key write in the context of SYSTEM by leveraging registry symbolic links.

In order to win a small time window between osk.exe starting and writing into the registry key, an opportunistic lock is placed on C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu.xml ,when the oplock is triggered the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\Session<session id>\ATConfig\osk registry key is replaced with a symbolic link pointing to an arbitrary registry key.

Exploitation

  • Obtain the session ID from current access token.
  • Create a hidden osk.exe process and sleep 5 seconds to ensure our oplock will be triggered by the system process.
  • Modify the HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\ATConfig\osk key and add an arbitrary registry value.
  • Set an opportunistic lock on C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu.xml file.
  • Trigger the bug by creating a secure desktop via the LockWorkstation() API.
  • Once an oplock is triggered, replace the HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Accessibility\Session<session id>\ATConfig\osk registry key with a registry link to arbitrary registry key.
  • Sleep 5 seconds before deleting the registry link.

In the proof of concept below we overwrite ImagePath of the msiserver service and start the service by creating an instance of the MSI COM object:

Our exploit code for this vulnerability is available here.

This post was written by Filip Dragovic.

Ready to engage
with MDSec?

Stay updated with the latest
news from MDSec.


文章来源: https://www.mdsec.co.uk/2026/03/rip-regpwn/
如有侵权请联系:admin#unsafe.sh