Skip to content
geeksforgeeks
  • Tutorials
    • Python
    • Java
    • Data Structures & Algorithms
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps And Linux
    • School Learning
    • Practice Coding Problems
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • Data Science Training Program
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • DSA
  • Practice Problems
  • C
  • C++
  • Java
  • Python
  • JavaScript
  • Data Science
  • Machine Learning
  • Courses
  • Linux
  • DevOps
  • SQL
  • Web Development
  • System Design
  • Aptitude
  • GfG Premium
Open In App
Next Article:
Follina: Unsolved Zero Day Vulnerability
Next article icon

Follina: Unsolved Zero Day Vulnerability

Last Updated : 01 Mar, 2023
Comments
Improve
Suggest changes
Like Article
Like
Report

Pre-requisites: Zero Day Exploit 

The Follina vulnerability is an elevation of privilege (EoP) vulnerability in the Windows operating system. The vulnerability is caused by a race condition in the Windows kernel and allows an attacker to gain local privilege escalation (LPE) on the system. This exploit can be used to gain access to the system, bypass authentication, and execute malicious code.

The vulnerability affects Windows 7 and Windows Server 2008 R2 and later versions. Microsoft has released a patch to address this vulnerability. It is important to note that this vulnerability can be used in conjunction with other vulnerabilities to gain access to the underlying system.

To exploit the vulnerability, an attacker needs to have access to the system and be able to run code on the system. The attacker needs to be able to create a race condition in the Windows kernel. This race condition can be used to bypass the security mechanisms in place and gain access to the underlying system.

Once access is gained, the attacker can then execute malicious code on the underlying system and gain complete control of the system. The attacker can then steal data, modify the system, or cause other malicious activities.

The Follina vulnerability is a serious threat to the security of Microsoft systems. It is important to patch the system as soon as possible. Microsoft has released a patch for the vulnerability and it is important to install the patch as soon as possible to prevent exploitation of the vulnerability.

It is also important to note that this vulnerability can be used in conjunction with other vulnerabilities to gain access to the underlying system. It is important to be aware of other vulnerabilities and patch them as soon as possible to prevent exploitation.

It is also important to be aware of the security measures that are in place on the system. It is important to ensure that all security measures are properly configured and that all patches and updates are installed as soon as possible.

It is also important to be aware of any malicious activities that may be taking place on the system. It is important to be aware of any suspicious activities that may be taking place on the system and to take steps to mitigate any potential threats.

Follina Execution:

In follina attacker generate a malicious word File and share it with the victim, Follina is a Remote Code Execution means If you open that word File in your system then the attacker can able to control your system by using Attacker Box.

Example: If I'm attacker and I want to open excel file in your system and type some data so I just execute these commands while using follina,

python3 follina.py -c "excel" //this vulnerability is unsolved and very dangerous Don't Misuse, Only Perform in your PC using Virtual Box.

In conclusion, the Follina vulnerability is a serious threat to the security of Microsoft systems. It is important to patch the system as soon as possible and be aware of any malicious activities that may be taking place on the system. It is also important to be aware of other vulnerabilities and patch them as soon as possible to prevent exploitation.


Next Article
Follina: Unsolved Zero Day Vulnerability

T

thannelc911m
Improve
Article Tags :
  • Ethical Hacking

Similar Reads

    Nexpose Vulnerability Analysis Tools
    In the realm of cybersecurity, ensuring the integrity and security of systems is paramount. With the continuous evolution of threats, it's imperative for professionals to utilize robust tools for vulnerability analysis. Among the myriad options available, Nexpose stands out as a powerful vulnerabili
    5 min read
    What is Risk-Based Vulnerability Management?
    Cyber threats are changing fast, and traditional vulnerability management is no longer as effective. Organizations simply cannot respond with the same urgency to every security weakness. This is where Risk-Based Vulnerability Management (RBVM) comes in. Rather than patching vulnerabilities blindly,
    9 min read
    What is Credentialed Vulnerability Scan?
    Scanning is the second phase in the hacking methodology and plays an important role in identifying critical vulnerabilities within a system or organization. An effective scanning process helps by detecting weaknesses that can be patched before attackers have a chance to exploit them. However, do vul
    4 min read
    What is Supply Chain Vulnerability? Uses and Examples
    Supply chain cyberattacks, such as ransomware attacks, data breaches, and tainted software updates, have made cybersecurity a critical component of supply chain risk management. Third-party vendors, cloud computing, and outsourced IT service firms are used by companies today, and therefore it is not
    10 min read
    Vulnerabilites in Computer System Security
    For computer system security technology there are various parameters and applications in such a way that are used in order to benefit the authorized user. The term vulnerability means flaws or errors that are present in the system due to which the information can be extracted by an unauthorized pers
    2 min read
geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • In Media
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Placement Training Program
  • Languages
  • Python
  • Java
  • C++
  • PHP
  • GoLang
  • SQL
  • R Language
  • Android Tutorial
  • Tutorials Archive
  • DSA
  • Data Structures
  • Algorithms
  • DSA for Beginners
  • Basic DSA Problems
  • DSA Roadmap
  • Top 100 DSA Interview Problems
  • DSA Roadmap by Sandeep Jain
  • All Cheat Sheets
  • Data Science & ML
  • Data Science With Python
  • Data Science For Beginner
  • Machine Learning
  • ML Maths
  • Data Visualisation
  • Pandas
  • NumPy
  • NLP
  • Deep Learning
  • Web Technologies
  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • ReactJS
  • NextJS
  • Bootstrap
  • Web Design
  • Python Tutorial
  • Python Programming Examples
  • Python Projects
  • Python Tkinter
  • Python Web Scraping
  • OpenCV Tutorial
  • Python Interview Question
  • Django
  • Computer Science
  • Operating Systems
  • Computer Network
  • Database Management System
  • Software Engineering
  • Digital Logic Design
  • Engineering Maths
  • Software Development
  • Software Testing
  • DevOps
  • Git
  • Linux
  • AWS
  • Docker
  • Kubernetes
  • Azure
  • GCP
  • DevOps Roadmap
  • System Design
  • High Level Design
  • Low Level Design
  • UML Diagrams
  • Interview Guide
  • Design Patterns
  • OOAD
  • System Design Bootcamp
  • Interview Questions
  • Inteview Preparation
  • Competitive Programming
  • Top DS or Algo for CP
  • Company-Wise Recruitment Process
  • Company-Wise Preparation
  • Aptitude Preparation
  • Puzzles
  • School Subjects
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Social Science
  • English Grammar
  • Commerce
  • World GK
  • GeeksforGeeks Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
geeksforgeeks-suggest-icon
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
geeksforgeeks-improvement-icon
Suggest Changes
min 4 words, max Words Limit:1000

Thank You!

Your suggestions are valuable to us.

What kind of Experience do you want to share?

Interview Experiences
Admission Experiences
Career Journeys
Work Experiences
Campus Experiences
Competitive Exam Experiences