Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the Advanced Local Procedure Call (ALPC) interface, which can allow a local user to obtain SYSTEM privileges.

As many of you have seen there is a zero-day, privilege escalation, exploit for nearly all current versions of windows.

We haven't seen any reasonable mitigating controls that can be put in place to detect or stop all variations of this attack. However the situation is evolving and hopefully, there will be more information released soon.

Leave a Reply