novirus Posted March 11 Report Share Posted March 11 c/p exploit this vulnerability was to plug in a Razer mouse, or the dongle it uses, and then shift-right from the Explorer window opened by Windows Update to choose a driver location and open a PowerShell with complete SYSTEM, or admin if you prefer, rights. And it got worse as an attacker would also be able to use the hack and save a service binary that could be "hijacked for persistence" and executed before the user even logs on during the boot process. look for windows 10 update to plug in this issue MS said asap x its installer issue. Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.