Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit

Exploit code has emerged for a previously unpatched Windows privilege escalation vulnerability, allowing potential attackers to gain SYSTEM or elevated administrator permissions. This flaw, known as BlueHammer, was disclosed by a security researcher who expressed dissatisfaction with the handling of the issue by Microsoft’s Security Response Center (MSRC).

Details of the Vulnerability

With no official patch or update available, this vulnerability falls under the category of zero-day threats as defined by Microsoft. The circumstances surrounding the public release of the exploit code remain ambiguous. Under the alias Chaotic Eclipse, the researcher stated, “I was not bluffing Microsoft, and I’m doing it again,” indicating a sense of urgency and frustration.

In a GitHub repository published on April 3rd, Chaotic Eclipse, now operating under the alias Nightmare-Eclipse, shared the exploit details while expressing disbelief at Microsoft’s response to the security issue. “I’m just really wondering what was the math behind their decision,” the researcher remarked, questioning the rationale behind the lack of action from Microsoft.

Technical Insights

Will Dormann, principal vulnerability analyst at Tharros, confirmed the functionality of the BlueHammer exploit, describing it as a local privilege escalation (LPE) vulnerability that combines a time-of-check to time-of-use (TOCTOU) issue with path confusion. Dormann elaborated that while the exploit is not trivial to execute, it grants local attackers access to the Security Account Manager (SAM) database, which contains password hashes for local accounts.

With this access, attackers can escalate their privileges to SYSTEM level, potentially leading to complete control over the affected machine. “At that point, [the attackers] basically own the system,” Dormann explained, noting that they could execute commands with SYSTEM privileges.

Exploit demo
Source: Will Dormann

Some researchers have tested the exploit and found it unsuccessful on Windows Server, corroborating Chaotic Eclipse’s claims regarding the presence of bugs that may hinder its effectiveness. Dormann noted that on the Server platform, the BlueHammer exploit elevates permissions from non-admin to elevated administrator, requiring user authorization for operations demanding full system access.

Implications and Risks

While the motivations behind the disclosure by Chaotic Eclipse/Nightmare-Eclipse remain unclear, Dormann highlighted that one of MSRC’s requirements for vulnerability submissions is the provision of a video demonstrating the exploit. This requirement, while potentially aiding Microsoft in managing reported vulnerabilities, adds an additional layer of complexity to the submission process.

Despite the necessity for local access to exploit BlueHammer, the associated risks are considerable. Attackers can gain local access through various means, including social engineering tactics, exploiting other software vulnerabilities, or credential-based attacks. The potential for significant security breaches underscores the importance of addressing this vulnerability promptly.

BleepingComputer has reached out to Microsoft for comments regarding the BlueHammer flaw but has yet to receive a response as of the publication time.

Winsage
Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit