Security News > 2022 > January > Public Exploit Released for Windows 10 Bug

Security teams might have skipped January's Patch Tuesday after reports of it breaking servers, but it also included a patch for a privilege-escalation bug in Windows 10 that leaves unpatched systems open to malicious actors looking for administrative access.
It's a bug that now has a proof-of-concept exploit available in the wild.
The exploit was released by Gil Dabah, founder and CEO of Privacy Piiano, who tweeted that he decided not to report the bug two years ago after finding it difficult to get paid on other bug bounties through the Microsoft program.
The bug was being exploited by sophisticated groups as a zero-day issue, Microsoft said.
January's Patch Tuesday was plagued by Windows server update issues that could have understandably made internal security teams pause before downloading the patches.
He noted how to "Kill the bug class": "Improve the kernel zero-day bounty, let more security researchers participate in the bounty program, and help the system to be more perfect."
News URL
https://threatpost.com/public-exploit-windows-10-bug/178135/
Related news
- Windows 10 KB5053606 update fixes broken SSH connections (source)
- APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373) (source)
- EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware (source)
- Windows 10 KB5055518 update fixes random text when printing (source)
- Bad luck, Windows 10 users. No fix yet for ransomware-exploited bug (source)
- PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware (source)
- ⚡ Weekly Recap: Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More (source)
- Windows 10 KB5055612 preview update fixes a GPU bug in WSL2 (source)