Windows Update Vulnerability Found, Microsoft Working on Patch

07 Aug 2024

At the Black Hat security conference in Las Vegas, new research has unveiled a significant vulnerability within the Windows Update mechanism that could potentially allow malicious actors to downgrade Windows operating systems to older versions. This downgrade could expose systems to a range of historical vulnerabilities, ultimately granting attackers full control over the affected devices. Microsoft is currently addressing this issue through a meticulous patching process, which has been dubbed “Downdate.”

Discovery and Implications

Alon Leviev, a researcher from SafeBreach Labs, initiated his investigation into downgrade attack methods after observing a concerning hacking campaign last year that employed the “BlackLotus UEFI bootkit.” This malware exploited a vulnerability by downgrading the Windows boot manager to an outdated version. Through his exploration of the Windows Update flow, Leviev identified a method to strategically downgrade either the entire operating system or select components.

Leviev's findings led to the development of a proof-of-concept attack that effectively disabled the Windows protection known as Virtualization-Based Security (VBS), targeting highly privileged code within the computer's core kernel. “I found a downgrade exploit that is fully undetectable because it is performed by using Windows Update itself,” Leviev explained. “In terms of invisibility, I didn’t uninstall any update—I basically updated the system even though under the hood it was downgraded. So the system is not aware of the downgrade and still appears up-to-date.”

Mechanics of the Vulnerability

The crux of Leviev's downgrade capability lies in a flaw within the Windows Update process components. When a user requests an update, their PC places this request in a designated update folder, which is then verified by the Microsoft update server. The server creates a separate, controlled update folder where it finalizes the update and maintains an action list, known as “pending.xml,” detailing the update steps.

Leviev discovered that while he could not directly modify the action list in the server's folder, one of the controlling keys, “PoqexecCmdline,” was not secured. This oversight allowed him to manipulate the action list and the entire update process without detection. With this newfound control, he devised strategies to downgrade critical Windows components, including:

  • Drivers that interact with hardware peripherals
  • Dynamic link libraries containing essential system programs and data
  • The NT kernel, which holds the core instructions necessary for system operation

Moreover, Leviev expanded his research to include Windows security components such as the Windows Secure Kernel, Credential Guard, the hypervisor, and VBS itself. While the technique does not provide a means to gain initial remote access, it poses a severe risk for attackers who already have some level of access, as it can reinstate numerous vulnerabilities that Microsoft has previously patched.

Microsoft's Response

In response to these findings, Microsoft has stated that it has not yet observed any attempts to exploit this vulnerability. A spokesperson emphasized, “We are actively developing mitigations to protect against these risks while following an extensive process involving a thorough investigation, update development across all affected versions, and compatibility testing, to ensure maximized customer protection with minimized operational disruption.”

Part of the remediation strategy includes revoking vulnerable VBS system files, a process that must be executed with caution to avoid integration issues or the reintroduction of previously resolved problems.

Leviev underscores the importance of recognizing downgrade attacks as a significant threat for the developer community, as hackers continuously seek stealthy avenues to exploit system vulnerabilities.

Windows 10 does not boot after update?

There can be several reasons why Windows 10 might not boot after an update. It could be due to incompatible drivers, corrupted system files, or a failed update installation. The system might also be stuck in a repair loop, where it continuously attempts and fails to repair itself. Other causes could include hardware issues or changes in system configurations that are incompatible with the new update.

How to fix windows 10 won't boot after update?

To fix Windows 10 when it won't boot after an update, you can try these steps: 1) Boot into Safe Mode and uninstall the recent updates. 2) Use System Restore to revert to a previous state. 3) Run Startup Repair from the Advanced Boot Options menu. 4) Check for and repair corrupt system files using the Command Prompt (sfc /scannow and chkdsk commands). 5) Boot from a Windows 10 installation media to repair or reinstall the OS. Make sure to back up your data before proceeding with major recovery steps.
Windows Update Viewer

Windows Update Viewer download for free to PC or mobile

Latest update Windows Update Viewer download for free for Windows PC or Android mobile

2
650 reviews
2921 downloads

News and reviews about Windows Update Viewer

30 Oct 2025

Event Viewer Enhances PC Troubleshooting Efficiency

Event Viewer, a built-in tool for Windows, simplifies diagnosing PC issues with detailed logs and analyses.

Read more

09 Oct 2025

Why Rolling Back a Windows Update Might Be Necessary

Learn when rolling back a Windows Update can solve critical issues like data loss or performance dips.

Read more

08 Oct 2025

Microsoft Resolves Long-Standing Windows Bug Affecting Shutdown

Microsoft has addressed a Windows bug that prompted systems to reboot instead of shutting down, impacting users for over two years. The fix is now available in beta and soon for all users.

Read more

25 Aug 2025

Managing Windows Update for Greater Control

Exploring strategies to manage Windows Update on your own terms. Learn effective techniques like Group Policy, metered connections, and more for a tailored Windows experience.

Read more

30 May 2025

Windows Update Expands to Include Third-Party Apps

Microsoft opens Windows Update to third-party apps, offering developers better control and centralizing updates through a consistent platform.

Read more

28 May 2025

Windows Update to Enhance App Update Capabilities

Microsoft to integrate application updates into Windows Update, offering developers new tools for efficient software management through an orchestration platform.

Read more

28 May 2025

Windows Expands Update Services for Third-Party Apps

Microsoft enhances Windows Update to include third-party apps, streamlining the update process for users and developers, and integrating app installers.

Read more

28 May 2025

Microsoft Refines Windows Update Strategy for Efficiency

Microsoft unveils a unified Windows update platform integrating apps and drivers, enhancing user experience and addressing fragmentation concerns.

Read more

28 May 2025

Microsoft Enhances Windows Update for Third-Party Apps

Microsoft opens Windows Update to third-party app updates, inviting developers to a private preview of its orchestration platform, enhancing support for business and general apps.

Read more

25 Apr 2025

Microsoft Patch Issues Raises Concerns Over Testing Procedures

The creation of a mysterious inetpub folder in the latest Microsoft patch raises security and testing concerns, as it allows users to block Windows updates without admin rights.

Read more