
Yesterday we reported on a recently-discovered zero-day flaw in the Windows 10 Taskscehduler ALPC interface. While Microsoft has yet to officially solve this problem, a third-party fix (a micropatch) has been issued. However, it is now known the vulnerability affects more Windows machines than originally thought. The vulnerability is within the Windows task scheduler API. The problem could allow an attacker to alter permissions and gain wider system access. To exploit the vulnerability, the attacker would need to be local and using the PC. The flaw is buried in the Windows 10 task scheduler and means the API function is not checking for permissions. Acros Security has issued a micropatch to mitigate the flaw. This fix stops any bad actors from exploiting the problem. Yesterday we revealed the vulnerability only affects Windows 10 64-bit. However, researchers have found the zero-day could be exploited on 32-bit machines with some minor changes. Not every Windows 10 users is going to receive the micropatch. That's because the fix is limited to 64-bit Windows 10 version 1803. More information will be provided tomorrow when Acros Security publishes a blog post on the fix.