Microsoft won't fix 'Dogwalk' zero-day from 2020

By
Follow google news

Microsoft Diagnostics Tools bug re-awakens.

Microsoft is declining to patch a two-year-old directory traversal vulnerability in all versions of Windows that researchers have labelled a zero-day.

Microsoft won't fix 'Dogwalk' zero-day from 2020

The bug was originally reported to Microsoft in January 2020 by security researcher Imre Rad, and like the recently discovered "Follina" vulnerability it involves attackers abusing Microsoft diagnostic tools to execute malicious code.

Rad found that a flaw in how cabinet (*.cab) files are verified allows attackers to save the file archives to any location on Windows computers.

By saving a diagcab file to the Startup folder in Windows, attackers can the run their code the next time a user logs in.

Security researcher j00sean rediscovered the vulnerability earlier this month, and noted that it bypasses not only Microsoft Defender, but also browser-based file downloader warnings to users.

Named "Dogwalk" by security researchers, the vulnerability also gets past Microsoft's Mark of the Web (MOTW) security attributes for files that warn users before opening them.

The Spanish security researcher also reported the flaw to Microsoft's security team, but was told the bug doesn't warrant fixing.

Security vendor 0patch has released free micropatches for Dogwalk that adds the missing security check, without a Windows reboot required.

At this stage, it is not known if the Dogwalk zero-day has been actively exploited by attackers.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

'Copy Fail' Linux privesc bug lay dormant in kernel since 2017

Medibank reveals attack vector and cost of 2022 security breach

Medibank reveals attack vector and cost of 2022 security breach

Attacker embeds Claude Code in mass credential harvesting op

Attacker embeds Claude Code in mass credential harvesting op

Log In

  |  Forgot your password?