Windows Downgrade attack exposes fully patched systems to old flaws

Windows Downgrade attack exposes fully patched systems to old flaws

SafeBreach security researcher Alon Leviev exposed two security vulnerabilities that could be exploited to perform downgrade attacks on fully updated Windows systems.

The technique effectively “unpatch” systems, reintroducing previously fixed vulnerabilities and rendering the notion of a “fully patched” Windows machine virtually meaningless.

The vulnerabilities, tracked as CVE-2024-38202 and CVE-2024-21302, affect Windows 10, Windows 11, and Windows Server platforms.

Leviev demonstrated how attackers could exploit these flaws to subvert the Windows Update process itself. Using a custom tool he developed, dubbed “Windows Downdate,” Leviev showed that it is possible to force an up-to-date Windows system to roll back critical components—such as dynamic link libraries (DLLs) and even the NT Kernel—to older, vulnerable versions. Despite these downgrades, the Windows Update service falsely reports that the system is fully updated.

As Leviev explained, the downgrade attack is undetectable because it cannot be blocked by endpoint detection and response (EDR) solutions, and it’s also invisible since Windows Update reports that a device is fully updated.

By downgrading key components like Credential Guard's Secure Kernel, the Isolated User Mode Process, and Hyper-V's hypervisor, the researcher managed to expose the systems to a multitude of past privilege escalation vulnerabilities. In essence, the attack reintroduces fixed vulnerabilities as though they were new, effectively turning them into zero-days once more.

Microsoft has published security advisories addressing the two unpatched vulnerabilities. The advisories provide temporary mitigations to reduce the risk of exploitation while the company works on a permanent fix.

Microsoft said that it is not currently aware of any active attempts to exploit these vulnerabilities in the wild.

Back to the list

Latest Posts

Cyber Security Week in Review: July 4, 2025

Cyber Security Week in Review: July 4, 2025

In brief: Google patches Chrome 0Day, the US is on the hunt for North Korean IT workers, and more.
4 July 2025
AI chatbots fall for phishing scams

AI chatbots fall for phishing scams

The models provided the correct URL only 66% of the time; nearly 30% of responses pointed users to dead or suspended domains.
3 July 2025
Chinese hackers exploited Ivanti flaws in attacks against French government

Chinese hackers exploited Ivanti flaws in attacks against French government

ANSSI believes that the Houken campaign is operated by ‘UNC5174’, an entity believed to act as an initial access broker for China’s Ministry of State Security.
2 July 2025