Critical Zero-Day Vulnerabilities in Atera’s Windows Installers Mitigated

TheRealThreatHuntress
2 min readJul 25, 2023

In a recent security revelation, Mandiant uncovered two zero-day vulnerabilities within Atera’s remote monitoring and management software for Windows Installers. These vulnerabilities posed significant security risks, as they could potentially lead to privilege escalation attacks. Tracked under CVE-2023–26077 and CVE-2023–26078, these flaws allowed attackers to execute arbitrary code with elevated privileges by exploiting misconfigured Custom Actions running under the NT AUTHORITY\SYSTEM context.

Security researcher Andrew Oliveau emphasized the danger of initiating operations from the NT AUTHORITY\SYSTEM context without proper management, as this could enable attackers to execute local privilege escalation attacks. These vulnerabilities resided in the MSI installer’s repair functionality, even if the operations were initiated by a standard user, presenting an alarming scenario.

Atera quickly responded to these findings and released versions 1.8.3.7 and 1.8.4.9, containing the necessary patches to remediate the issues. Users are strongly advised to update to the latest versions to safeguard their systems.

The vulnerabilities highlighted the importance of rigorous review and testing of Custom Actions by software developers. Misconfigurations in this area can be easily identified and exploited, potentially providing a foothold for attackers to hijack NT AUTHORITY\SYSTEM operations triggered by MSI repairs.

These revelations came in the wake of a recent severe privilege escalation flaw (CVE-2023–23397) in Windows that had been actively exploited in the wild. Kaspersky, the threat intelligence firm, discovered evidence of exploit attempts by an unknown attacker targeting government and critical infrastructure entities in Jordan, Poland, Romania, Turkey, and Ukraine prior to the public disclosure. The severity of this incident underscores the necessity for proactive security measures and prompt patching to prevent potential breaches and protect sensitive data.

In conclusion, the detection and resolution of the zero-day vulnerabilities in Atera’s Windows Installers serve as a reminder for organizations to remain vigilant and promptly update their software to stay one step ahead of potential threats. Cybersecurity remains a crucial aspect of modern-day business operations, and by prioritizing robust security practices, companies can ensure the safety of their systems and data from malicious actors.

--

--

No responses yet