A critical Windows zero-day exploit, dubbed BlueHammer, has been publicly leaked by a disgruntled security researcher frustrated with Microsoft’s handling of the vulnerability. The flaw, which remains unpatched, allows attackers to perform local privilege escalation (LPE) and gain SYSTEM or elevated administrator permissions on affected devices.
The exploit was published under the alias Nightmare-Eclipse on GitHub by a researcher known as Chaotic Eclipse. In the release, the researcher expressed frustration with Microsoft’s Security Response Center (MSRC), stating that previous reports had been ignored and that they wanted to demonstrate the seriousness of the issue. The PoC (proof-of-concept) code reportedly contains some bugs that may affect its reliability.
How BlueHammer Works
Security analysts, including Will Dormann, principal vulnerability analyst at Tharros, have confirmed that BlueHammer is a local privilege escalation flaw. It combines a time-of-check to time-of-use (TOCTOU) issue with a path confusion vulnerability, allowing a local attacker to access the Security Account Manager (SAM) database, which stores password hashes for local accounts.
From there, an attacker can escalate privileges to SYSTEM, essentially gaining full control over the affected machine. On Windows Server, the exploit elevates privileges from non-admin to elevated administrator, though it requires user approval for certain high-level operations.
While the vulnerability requires local access, attackers can reach this point through multiple avenues, including social engineering, other software vulnerabilities, or credential-based attacks.
Public Disclosure and Risks
Chaotic Eclipse stated that they were not providing detailed explanations of how the exploit works, leaving it to others to analyze. Some researchers have noted that the exploit may not function consistently due to coding bugs. Nevertheless, the disclosure has heightened concern, as BlueHammer poses a significant risk if a local attacker gains access.
Microsoft responded to inquiries, emphasizing its commitment to investigate reported security issues and release updates. The company supports coordinated vulnerability disclosure to ensure that vulnerabilities are carefully assessed before public release, balancing security research with customer protection.
Key Takeaways
- BlueHammer is a local privilege escalation zero-day for Windows.
- It can give attackers full SYSTEM-level access if local access is obtained.
- The exploit leverages TOCTOU and path confusion vulnerabilities.
- The PoC code was leaked due to frustration with Microsoft’s handling.
- Users should exercise caution with local access permissions and remain alert for updates.
The BlueHammer leak underscores the dangers of unpatched Windows vulnerabilities. Even local exploits can lead to full system compromise, highlighting the need for strict access controls and prompt updates once a patch is released.