BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
SAP Patches Critical CRM, S/4HANA, NetWeaver Vulnerabilities
/in General NewsSAP has released 26 new and one updated security notes on February 2026 security patch day.
The post SAP Patches Critical CRM, S/4HANA, NetWeaver Vulnerabilities appeared first on SecurityWeek.
SecurityWeek – Read More
8 Linux distros I always recommend first to developers – and why
/in General NewsThese Linux distributions deliver the compilers, flexibility, and stability serious development work demands.
Latest news – Read More
This new ‘sleeperware’ doesn’t set off alarms or crash your system – it sneaks in and waits
/in General NewsAs ransomware declines, a new more dangerous digital parasite quietly rises to take its place.
Latest news – Read More
Backslash Raises $19 Million to Secure Vibe Coding
/in General NewsThe company will use the investment to expand its R&D team and operations, deepen platform capabilities, and scale go-to-market presence.
The post Backslash Raises $19 Million to Secure Vibe Coding appeared first on SecurityWeek.
SecurityWeek – Read More
B&H is selling one of my favorite pro monitors for near its all-time low price
/in General NewsAsus’ ProArt PA27 is a creator-focused monitor with excellent color accuracy, making it a good option for photo, video, and design work. It’s on sale for Presidents’ Day.
Latest news – Read More
New ‘SSHStalker’ Linux Botnet Uses Old Techniques
/in General NewsEstimated to have infected 7,000 systems, the botnet uses a mass-compromise pipeline, deploying various scanners and malware.
The post New ‘SSHStalker’ Linux Botnet Uses Old Techniques appeared first on SecurityWeek.
SecurityWeek – Read More
The best business VoIP services in 2026: Expert tested and reviewed
/in General NewsTraditional business telephone lines won’t cut it for today’s consumers. These VoIP providers will propel your business communication methods into the modern age.
Latest news – Read More
From Folder Deletion to Admin: Lenovo Vantage (CVE‑2025‑13154)
/in General NewsLast year we wrote about a Windows 11 vulnerability that allowed a regular user to gain administrative privileges (see 300 Milliseconds to Admin: Mastering DLL Hijacking and Hooking to Win the Race (CVE-2025-24076 and CVE-2025-24994)). Not long after, Manuel Kiesel from Cyllective AG reached out to us after stumbling across a seemingly similar issue while investigating the Lenovo Vantage application. He asked for some Windows related help, which proved to be trickier than expected. It turns out that the exploit primitive for arbitrary file deletion to gain SYSTEM privileges no longer works on current Windows machines. However, adapting the code provided by Trend Micro’s ZDI still allowed us to use folders to exploit the vulnerability.
Discovery & Contact
Lenovo Vantage is an application provided by Lenovo that helps to manage computer hardware, including system updates and drivers. It offers various add-ons, such as a system cleanup task that removes unnecessary files. The application is available on the Windows Store and can be downloaded by any regular user.
By the time Manuel contacted us, most of the analysis of Lenovo Vantage had already been completed, and he had identified a potential vulnerability in the software’s file cleanup functionality. You can read about this on Cyllective’s blog. It boils down to the fact that the application, which runs as
SYSTEM, deletes a directory that can be modified by a regular user:In 2021, Abdelhamid Naceri demonstrated a technique showing how the deletion of user writable folder contents by an elevated account can lead to code execution with elevated privileges. We have abused this issue in the past, including in this case where we used the primitive to gain administrative privileges through a Lenovo vulnerability, tracked as CVE-2022-4569 and described in the Compass’ blog – Lenovo Update Your Privileges.
However, when we tried to use the tool provided by ZDI, we were unable to leverage the recursive file deletion primitive to gain
SYSTEMprivileges. After some investigation, it became clear that theINDEX_ALLOCATIONtrick no longer works on a fully up to date Windows 11 system, as also noted by Filip Dragovic:Technical Background – Exploit Primitive
As ZDI explained in their well written blog post, it was possible to abuse the MSI install rollback feature to turn an arbitrary folder deletion into a privilege escalation. Since this approach only works when a directory can be deleted, they expanded the attack surface and showed how the same idea can also be exploited when only arbitrary file deletion is available. The key insight was to transform a file deletion (
DeleteFileA) into a folder deletion by redirecting the call to the directory metadata attribute ($INDEX_ALLOCATION).As you can see here, when we run the following snippet in PowerShell on a fully up to date Windows 11 system such as 24H2, the
INDEX_ALLOCATIONtrick no longer appears to work:As a result, using
FolderContentsDeleteToFolderDelete.exeno longer works for arbitrary file deletes, which left us security analysts a bit disappointed (ehm … I mean relieved that this can no longer be abused).But then shortly after, we realized that we already had an arbitrary folder deletion primitive and did not need to depend on the
INDEX_ALLOCATIONtrick in the first place. With that insight, we adapted the ZDI tool and brought the tool back to life.In
FolderContentsDeleteToFolderDelete.cppwe remove the reference to theINDEX_ALLOCATIONon line 27, and on line 118 we open the handle to the directory instead of the file:After hours of trial and error, we found that the fix was surprisingly small!
PoC
After figuring this out, Manuel quickly wrapped the vulnerability trigger into a clean and easy to use proof of concept (PoC) executable. Once the Lenovo Vantage application was installed on the system, we were able to demonstrate that a regular user on Windows 11 could reliably exploit the vulnerability and gain administrative privileges.
Shout out to Lenovo’s PSIRT team for handling the responsible disclosure of the vulnerability well and responding in a timely manner. You can read the Lenovo vulnerability advisory here. This vulnerability has since been mitigated and cannot be exploited anymore.
We especially want to thank Manuel Kiesel from Cyllective AG for reaching out and allowing us to collaborate on a vulnerability! It was a pleasure!
Make sure to also check out the first part on Cyllective’s blog, as it covers the initial discovery and most of the technical details.
Disclosure Timeline
Compass Security Blog – Read More
Dutch Authorities Confirm Ivanti Zero-Day Exploit Exposed Employee Contact Data
/in General NewsThe Netherlands’ Dutch Data Protection Authority (AP) and the Council for the Judiciary confirmed both agencies (Rvdr) have disclosed that their systems were impacted by cyber attacks that exploited the recently disclosed security flaws in Ivanti Endpoint Manager Mobile (EPMM), according to a notice sent to the country’s parliament on Friday.
“On January 29, the National Cyber Security Center (
The Hacker News – Read More
Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
/in General NewsFortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems.
The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0.
“An improper neutralization of special elements used in an SQL Command (‘SQL Injection’) vulnerability [CWE-89] in FortiClientEMS may
The Hacker News – Read More