Press ESC to close

Finding vulnerabilities in ClipSp, the driver at the core of Windows’ Client License Platform

CategoryDetails
Threat ActorsNot explicitly mentioned.
Campaign OverviewResearch on vulnerabilities in the ClipSp driver, which implements client licensing and system policies in Windows 10 and 11. Vulnerabilities range from signature bypass to privilege escalation and sandbox escape.
Target RegionsGlobal, with potential impact on any system running Windows 10 or 11.
MethodologyExploitation of vulnerabilities in the ClipSp driver through obfuscated structures, signature bypass, and memory corruption issues.
Product TargetedMicrosoft Windows 10 and 11 systems, particularly the ClipSp driver used in licensing and policy management.
Malware ReferenceNot applicable; no specific malware is mentioned.
Tools UsedQiling binary emulation framework, IDA Pro with Python for reverse engineering, Microsoft’s LPAC sandbox testing tool.
Vulnerabilities ExploitedEight vulnerabilities identified: TALOS-2024-1964 to TALOS-2024-1988 (e.g., CVE-2024-38184, CVE-2024-38185). Key issues include signature bypass, out-of-bound reads, and potential out-of-bound writes.
TTPsReverse engineering obfuscated drivers; exploiting design flaws in license verification, encryption routines, and memory management.
AttributionCisco Talos research team.
RecommendationsPatch affected systems once updates are available; monitor ClipSp driver usage and implement additional checks for critical systems; evaluate potential exposure to sandbox escape and privilege escalation scenarios.
SourceCisco Talos Blog

Read full article: https://blog.talosintelligence.com/finding-vulnerabilities-in-clipsp-the-driver-at-the-core-of-windows-client-license-platform/

Disclaimer: The above summary has been generated by an AI language model

Source: Cisco Talos

Published on: November 25, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *