RedSun:Microsoft Defender 未修复 0-Day 漏洞利用云端文件逻辑缺陷获取 SYSTEM 权限
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我需要快速浏览文章内容,抓住关键点。 文章讲的是一个零日漏洞,叫做RedSun,影响微软的Defender。这个漏洞允许无权限的用户提升到SYSTEM级别,影响Windows 10、11和Server 2019及以后的版本。目前还没有补丁。 然后,这个漏洞是由一个叫Chaotic Eclipse的研究员发现的,之前还发布了另一个漏洞BlueHammer。RedSun利用了Defender处理云文件时的一个逻辑错误,导致恶意文件被重写到系统关键目录。 攻击步骤包括使用云文件API、暂停Defender进程、重定向写入路径到System32目录,最终覆盖关键系统文件,获得最高权限。这个漏洞影响范围广,可靠性高,目前还没有修复。 所以,在总结的时候需要包括:零日漏洞名称、影响版本、攻击者权限提升、未修补状态以及漏洞利用方式和影响范围。 控制在100字以内的话,要简洁明了。比如: 微软Defender被曝零日漏洞“RedSun”,允许无权用户提权至SYSTEM级。该漏洞利用Windows Defender云文件处理机制中的逻辑错误,在完全打补丁的Windows 10/11/Server 2019及后续版本中生效。攻击者可利用此漏洞重写系统关键文件以获取最高权限。目前尚未有补丁发布。 这样既涵盖了主要信息,又符合字数限制。 </think> 微软Defender被曝零日漏洞“RedSun”,允许无权用户提权至SYSTEM级。该漏洞利用Windows Defender云文件处理机制中的逻辑错误,在完全打补丁的Windows 10/11/Server 2019及后续版本中生效。攻击者可利用此漏洞重写系统关键文件以获取最高权限。目前尚未有补丁发布。 2026-4-17 05:8:2 Author: cybersecuritynews.com(查看原文) 阅读量:8 收藏

Defender 0-Day RedSun Exploit

A newly disclosed zero-day vulnerability in Microsoft Defender, dubbed “RedSun,” allows an unprivileged user to escalate privileges to full SYSTEM-level access on fully patched Windows 10, Windows 11, and Windows Server 2019 and later systems, and as of now, remains unpatched.

RedSun is the second zero-day exploit published within a two-week span in April 2026 by the security researcher known as “Chaotic Eclipse” (also referred to as Nightmare-Eclipse on GitHub).

The first exploit, BlueHammer, targeted a different Microsoft Defender local privilege escalation (LPE) flaw and was tracked as CVE-2026-33825, which Microsoft patched as part of April 2026’s Patch Tuesday updates.

RedSun follows the same exploit tradition but introduces an entirely new and independent attack vector, suggesting that Defender’s architectural weaknesses run far deeper than a single isolated flaw.

RedSun Exploit for Microsoft Defender

At the heart of RedSun is a deeply ironic logic flaw inside Windows Defender’s cloud file handling mechanism. When Defender detects a malicious file bearing a cloud tag, rather than simply quarantining or deleting the file, it inexplicably rewrites the file back to its original location. RedSun weaponizes this behavior through the following attack chain:

  • The attacker writes an EICAR test file to the filesystem using the Windows Cloud Files API (cldapi.dll)
  • An opportunistic lock (oplock) is used to pause Defender’s file restoration process mid-operation
  • NTFS directory junctions and reparse points redirect the write target path to C:\Windows\System32
  • When Defender resumes, it follows the redirected path and overwrites a critical system binary — such as TieringEngineService.exe — with SYSTEM-level privileges
  • The attacker then executes the overwritten binary to obtain full SYSTEM-level code execution

Independent security researcher Will Dormann, principal vulnerability analyst at Tharros, confirmed that the exploit works reliably on fully patched Windows 10, Windows 11, and Windows Server 2019 and later.

google

Exploit on Windows 11

Any Windows system with Windows Defender enabled and the cldapi.dll component present is potentially vulnerable. Affected platforms include:

  • Windows 10 (all supported versions)
  • Windows 11 (all supported versions)
  • Windows Server 2019, 2022, and 2025

The exploit functions with approximately 100% reliability even against systems with the latest April 2026 updates applied, making it particularly dangerous in enterprise environments.

The associated CVE identifier is CVE-2026-33825, carrying a CVSS score of 7.8 (High). The vulnerability is classified under CWE: Insufficient Granularity of Access Control, and its MITRE ATT&CK mapping falls under Privilege Escalation (TA0004).

The full PoC code has not been publicly released by the researcher, though the exploit methodology has been publicly documented on GitHub.

Unlike BlueHammer, which Microsoft addressed in its April 2026 Patch Tuesday cycle, RedSun currently has no available patch. Security teams are advised to monitor for anomalous Defender file write activity, particularly involving cldapi.dll operations targeting C:\Windows\System32, and to implement endpoint detection rules to flag oplock-assisted file redirection behaviors until Microsoft issues a formal fix.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews


文章来源: https://cybersecuritynews.com/defender-0-day-redsun/
如有侵权请联系:admin#unsafe.sh