New Tool Windows Downdate Enables Downgrade Attacks on Windows Systems

27 Aug 2024

SafeBreach security researcher Alon Leviev has unveiled a groundbreaking tool known as Windows Downdate, designed to facilitate downgrade attacks that can reintroduce previously patched vulnerabilities into current Windows 10, Windows 11, and Windows Server systems. This tool allows malicious actors to compel updated devices to revert to older software versions, thereby exposing them to security flaws that can be exploited.

Tool Overview

Windows Downdate is available as an open-source program built on Python, as well as a pre-compiled executable for Windows users. It enables the downgrading of various system components, including the Hyper-V hypervisor, Windows Kernel, NTFS driver, and Filter Manager driver, among others. Leviev has provided several practical examples demonstrating how to revert these components to their base versions, effectively reinstating vulnerabilities that were previously patched.

“You can use it to take over Windows Updates to downgrade and expose past vulnerabilities sourced in DLLs, drivers, the NT kernel, the Secure Kernel, the Hypervisor, IUM trustlets, and more,” Leviev elaborated. He also highlighted that the tool offers straightforward examples for reverting patches related to notable vulnerabilities such as CVE-2021-27090, CVE-2022-34709, CVE-2023-21768, and PPLFault.

Undetectable Exploits

During his presentation at Black Hat 2024, Leviev disclosed that the Windows Downdate tool exploits vulnerabilities CVE-2024-21302 and CVE-2024-38202. One of the most alarming aspects of this tool is its undetectability; it operates without being flagged by endpoint detection and response (EDR) solutions, while Windows Update continues to indicate that the system remains up-to-date, despite the downgrades.

“I discovered multiple ways to disable Windows virtualization-based security (VBS), including its features such as Credential Guard and Hypervisor-Protected Code Integrity (HVCI), even when enforced with UEFI locks. To my knowledge, this is the first time VBS’s UEFI locks have been bypassed without physical access,” Leviev stated. This capability effectively transforms a fully patched Windows machine into one vulnerable to a multitude of past exploits, rendering the term “fully patched” virtually meaningless in the context of Windows security.

Microsoft’s Response

In response to these developments, Microsoft released a security update (KB5041773) on August 7 to address the CVE-2024-21302 vulnerability related to Windows Secure Kernel Mode privilege escalation. However, a patch for CVE-2024-38202, which pertains to Windows Update Stack elevation of privilege, has yet to be issued. Until a fix is made available, Microsoft recommends that customers implement protective measures outlined in a recent security advisory.

  • Configure “Audit Object Access” settings to monitor file access attempts.
  • Restrict update and restore operations.
  • Utilize Access Control Lists to limit file access.
  • Audit privileges to identify potential exploitation attempts.

Top charts for Desktop Windows

uTorrent

uTorrent

Latest update uTorrent download for free for Windows PC or Android mobile

5
1032 reviews
6360704
downloads
Zona

Zona

Latest update Zona download for free for Windows PC or Android mobile

4
614 reviews
1260544
downloads
WinRAR

WinRAR

Latest update WinRAR download for free for Windows PC or Android mobile

5
735 reviews
494826
downloads
Minecraft

Minecraft

Latest update Minecraft download for free for Windows PC or Android mobile

5
750 reviews
453261
downloads

News and reviews for Desktop Windows

Pillars of Eternity Introduces New Turn-Based Mode

Obsidian unveils Pillars of Eternity's turn-based mode, launching beta on 2023-11-05. Aims at improved gameplay flexibility.

Read more

Arc Raiders Adds New Social Dynamics in Solo Queue

Arc Raiders players find success through communication in solo queue, transforming gameplay with increased cooperation and engagement.

Read more

Critical GDI Flaws Patched in Microsoft Windows

Microsoft uncovers and patches critical GDI flaws allowing remote code execution in Windows. Impacts extend to Microsoft Office for Mac and Android.

Read more

Zeekerss Launches 10-Year Text Adventure 'Welcome to the Dark Place'

Zeekerss releases 'Welcome to the Dark Place', blending text adventure techniques with bespoke audio for a unique gaming experience.

Read more

Design Director Plans Saints Row Prequel Pitch

Original Saints Row's Chris Stockman explores new prequel pitch focused on early series tone, rejecting VR approach.

Read more

Breach Wizards Levels Up with Community Expansion

Tactical Breach Wizards embraces a challenging new level pack. Discounted 40% until 2023-11-09. Includes 'less-than-lethal' pyromancer, Bori.

Read more

Stalker 2 Leaving Game Pass on 2025-11-15

Stalker 2 and Frostpunk exit Game Pass on 2025-11-15. Subscribers have limited time to play these titles before they're removed.

Read more

New PC Bang Spotted in Pyongyang With Asus ROG Setup

North Korea's new PC bang has emerged in Pyongyang, featuring Asus ROG gear and AAA games, suggesting limited, elite access.

Read more

Launches: Europa Universalis 5 and Football Manager 26 Expand PC Games Lineup

New PC games launched this week include Europa Universalis 5 and Football Manager 26, adding variety to the market with strategy and sports simulators.

Read more

Five New Steam Games Released: Notable Titles for November 2025

Explore five new Steam games launched in late October 2025, ranging from narrative adventures to twin-stick shooters and trading simulations.

Read more