By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler
Tech News

Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler

By Viral Trending Content 4 Min Read
Share
SHARE

Apr 16, 2025Ravie LakshmananEndpoint Security / Vulnerability

Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service that could be exploited by local attackers to achieve privilege escalation and erase logs to cover up evidence of malicious activities.

The issues have been uncovered in a binary named “schtasks.exe,” which enables an administrator to create, delete, query, change, run, and end scheduled tasks on a local or remote computer.

“A [User Account Control] bypass vulnerability has been found in Microsoft Windows, enabling attackers to bypass the User Account Control prompt, allowing them to execute high-privilege (SYSTEM) commands without user approval,” Cymulate security researcher Ruben Enkaoua said in a report shared with The Hacker News.

Cybersecurity

“By exploiting this weakness, attackers can elevate their privileges and run malicious payloads with Administrators’ rights, leading to unauthorized access, data theft, or further system compromise.”

The problem, the cybersecurity company said, occurs when an attacker creates a scheduled task using Batch Logon (i.e., a password) as opposed to an Interactive Token, causing the task scheduler service to grant the running process the maximum allowed rights.

However, for this attack to work, it hinges on the threat actor acquiring the password through some other means, such as cracking an NTLMv2 hash after authenticating against an SMB server or exploiting flaws such as CVE-2023-21726.

A net result of this issue is that a low-privileged user can leverage the schtasks.exe binary and impersonate a member of groups such as Administrators, Backup Operators, and Performance Log Users with a known password to obtain the maximum allowed privileges.

The registration of a scheduled task using a Batch Logon authentication method with an XML file can also pave the way for two defense evasion techniques that make it possible to overwrite Task Event Log, effectively erasing audit trails of prior activity, as well as overflow Security Logs.

Cybersecurity

Specifically, this involves registering a task with an author with the name, say, where the letter A is repeated 3,500 times, in the XML file, causing the entire XML task log description to be overwritten. This behavior could then be extended further to overwrite the whole “C:WindowsSystem32winevtlogsSecurity.evtx” database.

“The Task Scheduler is a very interesting component. Accessible by anyone willing to create a task, initiated by a SYSTEM running service, juggling between the privileges, the process integrities and user impersonations,” Enkaoua said.

“The first reported vulnerability is not only a UAC Bypass. It is far more than that: it is essentially a way to impersonate any user with its password from CLI and to obtain the maximum granted privileges on the task execution session, with the /ru and /rp flags.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Invisible Failures, Visible Fallout: Why Businesses Must Combat CX Blind Spots

How to Limit Galaxy AI to On-Device Processing—or Turn It Off Altogether

TSMC profits rise 61pc as AI drives demand for advanced chips

Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks

The Ultimate Dolby Atmos Experience Might Be In Your Car

TAGGED: Cyber Security, Cybersecurity, Internet, Malware, privilege escalation, Task Scheduler, UAC Bypass, windows security
Share This Article
Facebook Twitter Copy Link
Previous Article US stablecoins pose bigger risk than Trump tariffs, says Italy’s finance minister
Next Article Exclusion or extortion? $132M downtown tower sale leads to dueling lawsuits
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

These are the 5 riskiest FTSE shares, according to the experts…
Business
Ready or Not Sells Over 1 Million Units on Consoles in 4 Days
Gaming News
Life atop China’s car market starting to look shaky for BYD
Business
Invisible Failures, Visible Fallout: Why Businesses Must Combat CX Blind Spots
Tech News
Superman’s embarrassing video game legacy has a solve in Krypto
Gaming News
How to Limit Galaxy AI to On-Device Processing—or Turn It Off Altogether
Tech News
Chiefs' Rashee Rice Participating in Training Camp Despite Jail Sentence
Sports

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

These are the 5 riskiest FTSE shares, according to the experts…

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
These are the 5 riskiest FTSE shares, according to the experts…
July 21, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?