Windows Update Vulnerability Found, Microsoft Working on Patch

07 Aug 2024

At the Black Hat security conference in Las Vegas, new research has unveiled a significant vulnerability within the Windows Update mechanism that could potentially allow malicious actors to downgrade Windows operating systems to older versions. This downgrade could expose systems to a range of historical vulnerabilities, ultimately granting attackers full control over the affected devices. Microsoft is currently addressing this issue through a meticulous patching process, which has been dubbed “Downdate.”

Discovery and Implications

Alon Leviev, a researcher from SafeBreach Labs, initiated his investigation into downgrade attack methods after observing a concerning hacking campaign last year that employed the “BlackLotus UEFI bootkit.” This malware exploited a vulnerability by downgrading the Windows boot manager to an outdated version. Through his exploration of the Windows Update flow, Leviev identified a method to strategically downgrade either the entire operating system or select components.

Leviev's findings led to the development of a proof-of-concept attack that effectively disabled the Windows protection known as Virtualization-Based Security (VBS), targeting highly privileged code within the computer's core kernel. “I found a downgrade exploit that is fully undetectable because it is performed by using Windows Update itself,” Leviev explained. “In terms of invisibility, I didn’t uninstall any update—I basically updated the system even though under the hood it was downgraded. So the system is not aware of the downgrade and still appears up-to-date.”

Mechanics of the Vulnerability

The crux of Leviev's downgrade capability lies in a flaw within the Windows Update process components. When a user requests an update, their PC places this request in a designated update folder, which is then verified by the Microsoft update server. The server creates a separate, controlled update folder where it finalizes the update and maintains an action list, known as “pending.xml,” detailing the update steps.

Leviev discovered that while he could not directly modify the action list in the server's folder, one of the controlling keys, “PoqexecCmdline,” was not secured. This oversight allowed him to manipulate the action list and the entire update process without detection. With this newfound control, he devised strategies to downgrade critical Windows components, including:

  • Drivers that interact with hardware peripherals
  • Dynamic link libraries containing essential system programs and data
  • The NT kernel, which holds the core instructions necessary for system operation

Moreover, Leviev expanded his research to include Windows security components such as the Windows Secure Kernel, Credential Guard, the hypervisor, and VBS itself. While the technique does not provide a means to gain initial remote access, it poses a severe risk for attackers who already have some level of access, as it can reinstate numerous vulnerabilities that Microsoft has previously patched.

Microsoft's Response

In response to these findings, Microsoft has stated that it has not yet observed any attempts to exploit this vulnerability. A spokesperson emphasized, “We are actively developing mitigations to protect against these risks while following an extensive process involving a thorough investigation, update development across all affected versions, and compatibility testing, to ensure maximized customer protection with minimized operational disruption.”

Part of the remediation strategy includes revoking vulnerable VBS system files, a process that must be executed with caution to avoid integration issues or the reintroduction of previously resolved problems.

Leviev underscores the importance of recognizing downgrade attacks as a significant threat for the developer community, as hackers continuously seek stealthy avenues to exploit system vulnerabilities.

Windows 10 does not boot after update?

There can be several reasons why Windows 10 might not boot after an update. It could be due to incompatible drivers, corrupted system files, or a failed update installation. The system might also be stuck in a repair loop, where it continuously attempts and fails to repair itself. Other causes could include hardware issues or changes in system configurations that are incompatible with the new update.

How to fix windows 10 won't boot after update?

To fix Windows 10 when it won't boot after an update, you can try these steps: 1) Boot into Safe Mode and uninstall the recent updates. 2) Use System Restore to revert to a previous state. 3) Run Startup Repair from the Advanced Boot Options menu. 4) Check for and repair corrupt system files using the Command Prompt (sfc /scannow and chkdsk commands). 5) Boot from a Windows 10 installation media to repair or reinstall the OS. Make sure to back up your data before proceeding with major recovery steps.
Windows Update Viewer

Windows Update Viewer download for free to PC or mobile

Latest update Windows Update Viewer download for free for Windows PC or Android mobile

2
650 reviews
2905 downloads

News and reviews about Windows Update Viewer

30 May 2025

Windows Update Expands to Include Third-Party Apps

Microsoft opens Windows Update to third-party apps, offering developers better control and centralizing updates through a consistent platform.

Read more

28 May 2025

Windows Update to Enhance App Update Capabilities

Microsoft to integrate application updates into Windows Update, offering developers new tools for efficient software management through an orchestration platform.

Read more

28 May 2025

Windows Expands Update Services for Third-Party Apps

Microsoft enhances Windows Update to include third-party apps, streamlining the update process for users and developers, and integrating app installers.

Read more

28 May 2025

Microsoft Refines Windows Update Strategy for Efficiency

Microsoft unveils a unified Windows update platform integrating apps and drivers, enhancing user experience and addressing fragmentation concerns.

Read more

28 May 2025

Microsoft Enhances Windows Update for Third-Party Apps

Microsoft opens Windows Update to third-party app updates, inviting developers to a private preview of its orchestration platform, enhancing support for business and general apps.

Read more

24 Apr 2025

Microsoft Patch Issues Raises Concerns Over Testing Procedures

The creation of a mysterious inetpub folder in the latest Microsoft patch raises security and testing concerns, as it allows users to block Windows updates without admin rights.

Read more

01 Apr 2025

Resolving Error 0x800705b4 in Windows Updates

Encountering error 0x800705b4 in Windows Update can be frustrating. Learn how to resolve this issue with troubleshooting steps, antivirus checks, and system repairs.

Read more

01 Apr 2025

Windows Users Urged to Install Critical Security Updates

Microsoft identifies six critical zero-day vulnerabilities in Windows. A comprehensive update is available to help safeguard systems and mitigate potential security risks.

Read more

23 Sep 2024

Microsoft Updates Start Menu with New Account Manager and Enhanced Features

Microsoft has updated the Start menu, adding a new account manager for managing subscriptions like Office 365. Initially, the sign-out option was harder to find, but user feedback led to its easier access. Other updates include improved file sharing, media controls, and enhanced battery management.

Read more

28 Aug 2024

Microsoft Introduces Hotpatching to Reduce Reboots, Addresses New Vulnerability

Microsoft briefly published a support document on "hotpatching," a feature to reduce reboots after updates by patching in-memory code. Users may still need reboots for every third update. A new vulnerability in the Downdate tool could expose systems to old threats. Microsoft is addressing these issues.

Read more