The presentation discusses a vulnerability in Hyper-V's emulated storage component and how it was exploited on Windows Server 2012R2. It also explores the evolution of Windows between Windows 2012R2 and Redstone 3 and how the same vulnerability was exploited with numerous hardening measures in place. The talk concludes with a discussion on Microsoft's approach to hardening the Hyper-V stack and other critical code.
- Hyper-V's emulated storage component has a vulnerability that was reported through the Hyper-V bug bounty
- The vulnerability was exploited on Windows Server 2012R2
- The same vulnerability was exploited on Windows Redstone 3 with numerous hardening measures in place
- The presentation explores the evolution of Windows between Windows 2012R2 and Redstone 3
- Microsoft is approaching hardening the Hyper-V stack and other critical code
The speaker found a sketchy function called writedata port in the emulated storage stack that had him concerned. Although he did not find a way to trigger a bug there, he found a crash dump on his desk from a researcher who had a crash in Hyper-V. The researcher sent him a POC and worked on an exploit. The speaker then used the exploit to evaluate how their exploit mitigations were doing in general.