A French researcher discovered a security flaw in the most famous version of Windows developed by Microsoft, but the discovery came too late, as it had expired.
The researcher said that he accidentally discovered a security vulnerability affecting Windows 7 and Windows Server 2008 R2 while working on the Windows Security Tool update.
Microsoft reveals when to stop support for “Windows 7.”
Advice from Emirates Telecom to fill holes in Windows
And Windows 7 and Windows Server 2008 R2 have officially reached the end of life, and Microsoft has stopped providing free security updates.
According to art news, the vulnerability lies in two incorrectly configured registry keys for the RPC Endpoint Mapper and DNSCache services, part of all Windows installations.
Researcher Clement Labro said that an attacker with access to vulnerable systems could modify these registry keys to activate a commonly used subkey by Windows’s performance monitoring mechanism.
it’s too late
Most security researchers report serious security issues like this to Microsoft when they find them, but it was too late in Labro’s case.
Labor said he discovered the vulnerability after releasing an update to PrivescCheck to check for common Windows Security error configurations that malware could abuse to escalate privileges.
The PrivescCheck update added support for a new set of checks for privilege escalation techniques.
Labor said: I did not know that the new checks shed light on a new way to escalate privileges until I started the investigation with a series of alerts that appeared across old systems, such as Windows 7, days after the tool update was released.
By that time, it was too late for the researcher to report the problem to Microsoft, and the researcher instead chose to blog about the new method on his personal website.
Some security updates are available for Windows 7 users through the paid support program called (Extended Support Updates) ESU, but a fix for this issue has not yet been released.
It is not clear whether Microsoft will fix the new vulnerability.