The exploit supposedly allows hackers to gain system privileges on a Windows system once they have code execution capabilities Credit: Thinkstock Ever wonder how much an exploit for a previously unknown vulnerability that affects all Windows versions costs on the black market? The answer, according to a recent offer seen on a cybercrime forum, is $90,000.The offer was observed by researchers from security firm Trustwave on an underground market for Russian-speaking cybercriminals, where users hire malware coders, lease exploit kits, buy access to compromised websites or rent botnets.Zero-day exploits — exploits for unpatched vulnerabilities — are typically used for cyberespionage. Hackers sell them to governments and large corporations, under strict non-disclosure agreements, often through specialized brokers, so it’s uncommon to see them traded on cybercrime forums.While it’s hard to prove the authenticity of the offer without actually buying the exploit, there are strong indications that the author’s claims are real, the Trustwave researchers said in a blog post. The author went to great effort to prove that he has what he claims: a local privilege escalation exploit that works on all Windows versions since XP, including Windows Server editions, and bypasses common exploit mitigations like DEP, SMEP and ASLR.The vulnerability is supposedly located in the win32k.sys kernel driver, which historically has been a source of many privilege escalation flaws. The exploit relies solely on the KERNEL32 and USER32 Windows libraries (DLLs), the seller claims. The original starting price was $95,000, but it has since dropped to $90,000. For this sum, the exploit author offers the exploit’s source code as well as consultation and help integrating it into the buyer’s project.While privilege escalation flaws do not, by themselves, allow the remote compromise of a computer system, they’re still an important part of most attack chains. Many applications now run with limited privileges on Windows or have sandboxing mechanisms meant to prevent a full system compromise if an attacker finds and exploits a remote code execution vulnerability in them.In such environments, attackers need privilege escalation exploits to gain system-level access and take full control of a computer, making them highly valuable. With system privileges attackers can then install rootkits and hide their malicious code from security products for increased stealth and persistence.In a Windows server environment, a simple SQL or file injection vulnerability in a website can turn into a complete server compromise through such an exploit.Based on the little data that has leaked into the public domain about exploit prices, $90,000 for a Windows privilege escalation exploit is “on the high end but still within a realistic price range, especially considering the return on investment criminals are likely to make using this exploit in any campaign,” the Trustwave researchers said.Microsoft defended its security measures. “Windows is the only platform with a customer commitment to investigate reported security issues, and proactively update impacted devices as soon as possible,” a company representative said. Microsoft recommends customers use Windows 10 and the Edge browser for the best protection, and the company’s standard policy to update software during its regular Update Tuesday schedule, the company said.If the exploit seller’s claims are accurate, it’s hard to defend against this exploit, especially since a demo video shows the exploit successfully bypassing all the protections enforced by Microsoft’s Enhanced Mitigation Experience Toolkit (EMET).That said, users should make sure that they take the common precautions like keeping their software up-to-date and running a capable security product. This could break a different link in a potential attack chain, such as a remote code execution exploit needed to gain access to the system in the first place.[Edited 6/1/2016 to include comment from Microsoft. -S.Ragan] Related content news Is China waging a cyber war with Taiwan? Nation-state hacking groups based in China have sharply ramped up cyberattacks against Taiwan this year, according to multiple reports. By Gagandeep Kaur Dec 01, 2023 4 mins Cyberattacks Government Government news Apple patches info-stealing, zero day bugs in iPads and Macs The vulnerabilities that can allow the leaking of sensitive information and enable arbitrary code execution have had exploitations in the wild. By Shweta Sharma Dec 01, 2023 3 mins Zero-day vulnerability feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff Dec 01, 2023 6 mins Technology Industry IT Skills Events news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe