Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
      • About US
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
    NotesleuNotesleu
    Home»Cybersecurity»Atera Windows Installers’ Zero-Day Vulnerabilities Pose Risk of Privilege Escalation Attacks

    Atera Windows Installers’ Zero-Day Vulnerabilities Pose Risk of Privilege Escalation Attacks

    By NotesleuNo Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Reddit Copy Link

    Critical zero-day vulnerabilities identified in Atera remote monitoring and management software’s Windows Installers are posing significant risks as they expose users to potential privilege escalation attacks.

    Security firm Mandiant first discovered these flaws on February 28, 2023, and they have since been assigned the identifiers CVE-2023-26077 and CVE-2023-26078. Atera swiftly responded by releasing remediated versions 1.8.3.7 and 1.8.4.9 on April 17, 2023, and June 26, 2023, respectively.

    Security expert Andrew Oliveau warned about the vulnerabilities, explaining that “The ability to initiate an operation from a NT AUTHORITY\SYSTEM context can present potential security risks if not properly managed.” Oliveau went on to add that any misconfigured Custom Actions running as NT AUTHORITY\SYSTEM could be exploited by cybercriminals to conduct local privilege escalation attacks.

    If successfully exploited, these flaws could provide cybercriminals with an avenue to execute arbitrary code with elevated privileges. Both vulnerabilities exist within the MSI installer’s repair functionality, potentially leading to a scenario where operations are triggered from an NT AUTHORITY\SYSTEM context, even when initiated by a standard user.

    Google’s threat intelligence firm discovered that Atera Agent is vulnerable to a local privilege escalation attack. This can be exploited through DLL hijacking (CVE-2023-26077), which could then be manipulated to obtain a Command Prompt as the NT AUTHORITY\SYSTEM user.

    CVE-2023-26078, meanwhile, relates to the execution of system commands that initiate the Windows Console Host (conhost.exe) as a child process. This process could result in a command window that, if executed with elevated privileges, can be exploited by an attacker to perform a local privilege escalation attack.

    Andrew Oliveau underscored the risks posed by these vulnerabilities, stating, “Misconfigured Custom Actions can be trivial to identify and exploit, posing significant security risks for organizations.” He further stressed the need for software developers to meticulously review their Custom Actions to avert potential attacks arising from hijacked NT AUTHORITY\SYSTEM operations triggered by MSI repairs.

    These revelations surface as Kaspersky uncovers more details on a previously resolved, severe privilege escalation flaw in Windows (CVE-2023-23397, CVSS score: 9.8) that has been actively exploited. Evidence obtained by the antivirus vendor suggests that an unidentified attacker had targeted government and critical infrastructure entities in countries including Jordan, Poland, Romania, Turkey, and Ukraine, a month before this vulnerability was publicly disclosed.

    Found this news interesting? Follow us on Twitter  and Telegram to read more exclusive content we post.

    Post Views: 57
    Featured Trending
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Next Article Lazarus Hackers Exploit Microsoft IIS Servers for Malware Dissemination

    Related Posts

    General News December 26, 2025

    Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme

    December 26, 2025
    Cyber Attacks December 26, 2025

    2 Million Affected by SQL Injection and XSS Data Breach

    December 26, 2025
    Cyber Attacks December 26, 2025

    Cybersecurity Experts Uncover ToddyCat’s Expanded Arsenal of Data Theft Tools

    December 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Popular Post

    Complete HTML Handwritten Notes

    NKAbuse Malware Exploits NKN Blockchain for Advanced DDoS Attacks

    Advanced Python Mastery: For the Serious Developer

    Complete C++ Handwritten Notes From Basic to Advanced

    Google Introduces New Features Empowering Users to Manage Online Information

    © 2025 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.