Exploitation Tools

Windows Downdate – Mastering The Art Of OS Downgrade Attacks

A tool that takes over Windows Updates to craft custom downgrades and expose past fixed vulnerabilities. Presented at Black Hat USA 2024 Briefings and DEFCON 32 under the title “Windows Downdate: Downgrade Attacks Using Windows Updates”.

Using Windows Downdate you can downgrade critical OS components, DLLs, Drivers, the NT kernel, the Secure Kernel, the Hyper-V hypervisor, Credential Guard and much more!

Setup

To install Windows Downdate, follow the steps below.

  1. Clone this repository
  2. Launch CMD and change directory to the cloned repository directory
  3. Run the following command
python311 setup.py install
  1. You can now execute Windows Downdate

Release Binary

Windows Downdate also supports PyInstaller pre-compiled binary that you can download here

Usage

Windows Downdate operates on a config XML file that specifies the files to downgrade

windows_downdate.py --config-xml <CONFIG XML PATH> <ADDITIONAL ARGS>

Config XML Format

<Configuration>
    <UpdateFilesList>
        <UpdateFile source="path\to\source.exe" destination="path\to\destination.exe" />
    </UpdateFilesList>
</Configuration>

<Configuration>: The root element that encapsulates the entire configuration.

<UpdateFilesList>: A container element that holds one or more elements.

<UpdateFile>: Defines a single file downgrade operation.

source: The path of the downgrade source file. Note that if the source file does not exist, Windows Downdate attempts to retrieve its base version from the component store.

destination: The path of the downgrade destination file.

Simply put – take the XML snippet and insert <UpdateFile> elements, the source replaces the destination.

You can also refer to the examples directory as reference for finalized config XML files.

Execution Options

Windows Downdate supports two execution options.

1. Custom Downgrades

Windows Downdate supports crafting custom downgrades. To craft custom downgrade, you need to create a config XML file and just feed the tool with this config XML.

2. Downgrade Usage Examples

Windows Downdate has built-in usage examples with ready config XML files and vulnerable modules. The supported usage examples are listed below.

  1. CVE-2021-27090 Secure Kernel Elevation of Privilege Patch Downgrade
  2. CVE-2022-34709 Credential Guard Elevation of Privilege Patch Downgrade
  3. CVE-2023-21768 AFD Driver Elevation of Privilege Patch Downgrade
  4. Hyper-V Hypervisor Downgrade
  5. Kernel Suite Downgrade
  6. PPLFault Patch Downgrade
  7. VBS UEFI Lock Bypass
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

WID_LoadLibrary : The Intricacies Of DLL Management In Windows

WID_LoadLibrary is a custom implementation inspired by the Windows API function LoadLibrary, which is used…

14 hours ago

Locksmith : A Tool For Securing Active Directory Certificate Services

Locksmith is a specialized tool designed to identify and remediate vulnerabilities in Active Directory Certificate…

14 hours ago

Uscrapper Vanta : A Cutting-Edge OSINT Tool For Advanced Data Extraction

Uscrapper Vanta is a powerful open-source intelligence (OSINT) tool designed to revolutionize web scraping and…

14 hours ago

Pake : Transforming Webpages Into Desktop Applications

Pake is an innovative tool designed to convert any webpage into a desktop application with…

19 hours ago

Bevy : Exploring The Frontier Of Game Development With Rust

Bevy is an open-source, data-driven game engine built in Rust, designed to simplify game development…

19 hours ago

AppFlowy Cloud : Enhancing Collaboration With Secure Cloud Infrastructure

AppFlowy Cloud is a robust component of the AppFlowy ecosystem, designed to provide secure user…

2 days ago