Share this article

Latest news

With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low

Copilot in Outlook will generate personalized themes for you to customize the app

Microsoft will raise the price of its 365 Suite to include AI capabilities

Death Stranding Director’s Cut is now Xbox X|S at a huge discount

Outlook will let users create custom account icons so they can tell their accounts apart easier

Zero-day exploit in Windows Event Log allows hackers to remain hidden

The exploit can’t be performed remotely and it can’t run any code

2 min. read

Published onFebruary 1, 2024

published onFebruary 1, 2024

Share this article

Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more

A new vulnerability has been found in Windows Event Log that allows hackers to crash the Windows Event Log service on all supported versions of Windows.

So how does this exploit work and how dangerous it is? Keep on reading to find out!

A new Event Log exploit has surfaced, and it covers hackers’ tracks

A new Event Log exploit has surfaced, and it covers hackers’ tracks

This exploit was first found by a Twitter user Florian while working on a fuzzer.

A bug allows any user to crash the Windows Event Log service of any other Windows 10/Server 2022 machine on the same domain. According to MSRC, the bug does not meet the bar for servicing and therefore they allowed me to publish a proof of concept.https://t.co/Gmtn3NEbn5pic.twitter.com/qu3v77VfLy

According to Florian, he tested this exploit in a network that consists of Windows 10 and Windows Server 2022 domain controller.

He states that he was able to crash the Event Log service on the domain controller from his Windows 10 machine. And this didn’t even require administrative privileges, meaning anybody can do it.

Acros Security tested this exploit, and it was confirmed that it’s present on Windows 11 as well. To make matters worse, it only takes a second for the attacker to perform this exploit.

After crashing the Windows Event Log service three times, it won’t restart anymore, and if the hacker manages to crash the system, Security and System events won’t be stored.

While this exploit doesn’t allow the hackers to run any code or gain administrative privileges, it prevents the gathering of logs making any malicious activity hidden from administrators.

While this looks scary, there is some good news. This exploit doesn’t work remotely, and it can only be used in a local network.

Microsoft hasn’t addressed this issue, however, a micro patch from Acros is available, so concerned administrators can install it.

Microsoft is quick to address security problems, and they did the same with arecent Azure Pipelines security issueandCVE-2024-0519 vulnerability in Edge, so we expect an official patch to be released soon.

More about the topics:security threats

Milan Stanojevic

Windows Toubleshooting Expert

Milan has been enthusiastic about technology ever since his childhood days, and this led him to take interest in all PC-related technologies. He’s a PC enthusiast and he spends most of his time learning about computers and technology.

Before joining WindowsReport, he worked as a front-end web developer. Now, he’s one of the Troubleshooting experts in our worldwide team, specializing in Windows errors & software issues.

User forum

0 messages

Sort by:LatestOldestMost Votes

Comment*

Name*

Email*

Commenting as.Not you?

Save information for future comments

Comment

Δ

Milan Stanojevic

Windows Toubleshooting Expert

Before joining WindowsReport, he worked as a front-end web developer. Now, he’s specialized in Windows errors & software issues.