itm4n / PrivescCheck

Privilege Escalation Enumeration Script for Windows
BSD 3-Clause "New" or "Revised" License
2.91k stars 422 forks source link

Disabled WSUS config #34

Closed s-bt closed 2 years ago

s-bt commented 2 years ago

Hi there,

I had a customer today where the DWORD Value DisableWindowsUpdateAccess under HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate was set to 1 which seems to effectively disable Windows Update and the config is not vulnerable event though http is set. Would be great if that made into the checks.

itm4n commented 2 years ago

Hi!

My understanding is that this setting disables user access to Windows Update and it also prevents Windows Update from querying public MS servers. However, it does not mean that the WSUS configuration is not vulnerable. The vulnerability lies in the fact that it uses clear text HTTP traffic to query and download updates from the internal servers.

So, DisableWindowsUpdateAccess should definitely make it harder to exploit but it does not mean the configuration is not vulnerable. Anyway, it is probably a good idea to add this to the check indeed.

itm4n commented 2 years ago

The script now reports the value of DisableWindowsUpdateAccess in case the configuration is vulnerable.

Feel free to close the issue or add a comment if you have a different understanding in regard to my previous message.