That is the place issues get tough. Reguly argued that this quantities to a safety gap.
“With the proof-of-concept offered, we’re performing the motion of launching an elevated command immediate. This might be completed by an administrator, however they’d get a UAC immediate. As an alternative, we’re utilizing a malicious method, and also you don’t get a UAC immediate,” Reguly mentioned. “If UAC is a safety characteristic and we’re operating one thing that may usually require a UAC immediate with out one, that sounds to me like a safety characteristic bypass. Microsoft, historically, has fastened safety characteristic bypasses, however, on this case, due to the wording of the Microsoft Safety Servicing Standards for Home windows, they aren’t.”
That final line is certainly the thrust of the Microsoft argument. Of their Safety Service Standards for Home windows, Microsoft says “Administrative processes and customers are thought of a part of the Trusted Computing Base (TCB) for Home windows and are subsequently not strongly remoted from the kernel boundary. Directors are in charge of the safety of a tool and might disable safety features, uninstall safety updates, and carry out different actions that make kernel isolation ineffective. This consists of actions which require Administrator permissions like registry tampering with HKEY_LOCAL_MACHINE and any assault the place the attacker has Native or Area Administrator entry.”