Article Details
Scrape Timestamp (UTC): 2025-08-10 12:38:59.318
Source: https://thehackernews.com/2025/08/researchers-detail-windows-epm.html
Original Article Text
Click to Toggle View
Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation. Cybersecurity researchers have presented new findings related to a now-patched security issue in Microsoft's Windows Remote Procedure Call (RPC) communication protocol that could be abused by an attacker to conduct spoofing attacks and impersonate a known server. The vulnerability, tracked as CVE-2025-49760 (CVSS score: 3.5), has been described by the tech giant as a Windows Storage spoofing bug. It was fixed in July 2025 as part of its monthly Patch Tuesday update. Details of the security defect were shared by SafeBreach researcher Ron Ben Yizhak at the DEF CON 33 security conference this week. "External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network," the company said in an advisory released last month. The Windows RPC protocol utilizes universally unique identifiers (UUIDs) and an Endpoint Mapper (EPM) to enable the use of dynamic endpoints in client-server communications, and connect an RPC client to an endpoint registered by a server. The vulnerability essentially makes it possible to manipulate a core component of the RPC protocol and stage what's called an EPM poisoning attack that allows unprivileged users to pose as a legitimate, built-in service with the goal of coercing a protected process to authenticate against an arbitrary server of an attacker's choosing. Given that the functioning of EPM is analogous to that of the Domain Name System (DNS) – it maps an interface UUID to an endpoint, just the DNS resolves a domain to an IP address – the attack plays out like DNS poisoning, in which a threat actor tampers with DNS data to redirect users to malicious websites - "I was shocked to discover that nothing stopped me from registering known, built-in interfaces that belong to core services," Ben Yizhak said in a report shared with The Hacker News. "I expected, for example, if Windows Defender had a unique identifier, no other process would be able to register it. But that was not the case." "When I tried registering an interface of a service that was turned off, its client connected to me instead. This finding was unbelievable—there were no security checks completed by the EPM. It connected clients to an unknown process that wasn't even running with admin privileges." The crux of the attack hinges on finding interfaces that aren't mapped to an endpoint, as well as those that could be registered right after the system boots by taking advantage of the fact that many services are set to "delayed start" for performance reasons, and make the boot process faster. In other words, any service with a manual startup is a security risk, as the RPC interface wouldn't be registered on boot, effectively making it susceptible to a hijack by allowing an attacker to register an interface before the original service does. SafeBreach has also released a tool called RPC-Racer that can be used to flag insecure RPC services (e.g., the Storage Service or StorSvc.dll) and manipulate a Protected Process Light (PPL) process (e.g., the Delivery Optimization service or DoSvc.dll) to authenticate the machine account against any server selected by the attacker. The PPL technology ensures that the operating system only loads trusted services and processes, and safeguards running processes from termination or infection by malicious code. It was introduced by Microsoft with the release of Windows 8.1. At a high level, the entire attack sequence is as follows - To accomplish this, an offensive open-source tool like Certipy can be used to request a Kerberos Ticket-Granting Ticket (TGT) using the certificate generated by passing the NTLM information to the AD CS server, and then leverage it to dump all secrets from the domain controller. SafeBreach said the EPM poisoning technique could be further expanded to conduct adversary-in-the-middle (AitM) and denial-of-service (DoS) attacks by forwarding the requests to the original service or registering many interfaces and denying the requests, respectively. The cybersecurity company also pointed out that there could be other clients and interfaces that are likely vulnerable to EPM poisoning. To better detect these kinds of attacks, security products can monitor calls to RpcEpRegister and use Event Tracing for Windows (ETW), a security feature that logs events that are raised by user-mode applications and kernel-mode drivers. "Just like SSL pinning verifies that the certificate is not only valid but uses a specific public key, the identity of an RPC server should be checked," Ben Yizhak said. "The current design of the endpoint mapper (EPM) doesn't perform this verification. Without this verification, clients will accept data from unknown sources. Trusting this data blindly allows an attacker to control the client's actions and manipulate it to the attacker's will."
Daily Brief Summary
SafeBreach researchers disclosed a vulnerability in Windows RPC protocol, allowing attackers to impersonate legitimate servers through EPM poisoning, potentially escalating domain privileges.
The flaw, identified as CVE-2025-49760, was patched by Microsoft in July 2025 during its regular Patch Tuesday updates.
The vulnerability exploits the Windows Storage spoofing mechanism, enabling unauthorized attackers to manipulate core RPC components and perform network spoofing.
Attackers can register interfaces of inactive services, tricking clients into connecting to malicious servers without administrative privileges.
SafeBreach released the RPC-Racer tool to identify insecure RPC services and manipulate protected processes, highlighting the potential for adversary-in-the-middle and DoS attacks.
Enhanced monitoring through RpcEpRegister calls and Event Tracing for Windows (ETW) is recommended to detect such attacks.
The issue underscores the need for improved verification processes in the endpoint mapper to prevent unauthorized data acceptance and manipulation.