Threat Level: green Handler on Duty: Bojan Zdrnja

SANS ISC: Internet Storm Center - Internet Security | DShield Internet Storm Center


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Latest Diaries

Those pesky registry keys required by critical security patches

Published: 2018-01-12
Last Updated: 2018-01-12 13:02:51 UTC
by Bojan Zdrnja (Version: 1)
0 comment(s)

With the “storm” around Meldown and Spectre slowly winding down, I would like to remind everyone on registry changes that are required by the latest patches released by Microsoft.

In most cases, the anti-virus that you are running should have created the required registry key that will allow installation of the released security patches. However, keep in mind that if the registry key is not present, that the patches will not be installed: not only that, in case the registry key is missing even future patches might not be installed, according to the Microsoft’s support web page at https://support.microsoft.com/en-us/help/4072699/january-3-2018-windows-security-updates-and-antivirus-software.

So, in order to make sure that all patches have been successfully installed make sure that the registry key mentioned in the article exists – there are various tools that can help with this.
The story with the registry key reminded me of another critical security patch that also requires a registry key to be set in order to properly work. I often tend to find servers missing this in internal penetration test, and the consequences are very serious.

The patch I am referring to is KB2871997 (https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/2871997), originally from 2014. This patch helps remove clear text credentials from memory on affected Windows operating systems – something that Mimikatz, an attacker’s favorite tool successfully exploits.

In the figure below you can see how Mimikatz successfully extracts the plain text password from an unpatched Windows 2008R2 server.

No WDigest patch or registry key

Unfortunately, even after installing the patch, the clear text password is still in memory – Microsoft presumably did not want to change the default behavior for WDigest. The problem is that many administrators missed that the registry key needs to be added – as I mentioned previously, in (too) many internal penetration tests I find Windows 2008R2 servers which are fully patched, but miss this registry key. Once an attacker gets administrator privileges, on such a system, he can run Mimikatz and dump plain text password.

Additionally, after applying the patch, you also need to reboot the server for the patch to finally take effect – until the server has been rebooted the passwords are still available in memory. Once this has been finally done, plain text passwords will not be available in the memory, as shown in the figure below:

After the patch and registry key added

If you are still running Windows 2008R2 servers, make sure that both the patch and registry key have been successfully applied. Additionally, make sure that you monitor this registry key and any potential changes on servers: an attacker could possibly change the value of the registry key to any other value (i.e. 1) and wait for the server to reboot; once rebooted the server will again start keeping plain text passwords in memory. Something to watch for.

--
Bojan
@bojanz
INFIGO IS

Keywords: registry wdigest
0 comment(s)

If you have more information or corrections regarding our diary, please share.

Recent Diaries

Mining or Nothing!
Jan 11th 2018
1 day ago by Xme (1 comment)

GitHub InfoSec Threepeat: HELK, ptf, and VulnWhisperer
Jan 10th 2018
2 days ago by Russ McRee (1 comment)

Microsoft January 2018 Patch Tuesday
Jan 10th 2018
2 days ago by Johannes (0 comments)

What is going on with port 3333?
Jan 10th 2018
2 days ago by Jim (5 comments)

A Story About PeopleSoft: How to Make $250k Without Leaving Home.
Jan 9th 2018
2 days ago by Johannes (0 comments)

Meltdown and Spectre: clearing up the confusion
Jan 8th 2018
4 days ago by Bojan (8 comments)

Fake anti-virus pages popping up like weeds
Jan 8th 2018
4 days ago by Brad (1 comment)

Stone Soup Security
Jan 7th 2018
5 days ago by Kevin Liston (1 comment)

SSH Scans by Clients Types
Jan 7th 2018
5 days ago by Guy (1 comment)

View All Diaries →

Latest Discussions

What is airbnb doing?
created Jan 9th 2018
2 days ago by Mike (0 replies)

Convert OST Emails to PST Files
created Jan 4th 2018
1 week ago by Anonymous (0 replies)

Windows Client what the hell is this?
created Jan 2nd 2018
1 week ago by Anonymous (0 replies)

My log Reports not displaying reported entries
created Dec 22nd 2017
3 weeks ago by Tony (0 replies)

StormCast RSS feed not supporting older SSL?
created Dec 15th 2017
4 weeks ago by Anonymous (0 replies)

View All Forums →

Latest News

View All News →

Top Diaries

Wide-scale Petya variant ransomware attack noted
Jun 27th 2017
6 months ago by Brad (6 comments)

Using a Raspberry Pi honeypot to contribute data to DShield/ISC
Aug 3rd 2017
5 months ago by Johannes (12 comments)

Detection Lab: Visibility & Introspection for Defenders
Dec 15th 2017
4 weeks ago by Russ McRee (2 comments)

Second Google Chrome Extension Banker Malware in Two Weeks
Aug 29th 2017
4 months ago by Renato (0 comments)

Maldoc with auto-updated link
Aug 17th 2017
4 months ago by Xme (2 comments)