Skip to main content

This Windows Update exploit is downright terrifying

Windows Update running on a laptop.
Clint Patterson / Unsplash

Windows Update may occasionally backfire with faulty patches, but for the most part, it’s meant to keep us safe from the latest threats. Microsoft regularly pushes new patches that address potential vulnerabilities. But what if there were a tool that could undo every Windows Update and leave your PC exposed to all the threats Microsoft thought it had already fixed? Bad news: Such a tool now exists, and it’s called Windows Downdate.

Don’t worry, though. You’re safe from Windows Downdate — at least for now. The tool was developed as a proof-of-concept by SafeBreach researcher Alon Leviev, and although its potential is nothing short of terrifying, it was made in good faith as an example of something called “white-hat hacking,” where researchers try to find vulnerabilities before malicious threat actors can do it first.

Recommended Videos

In the case of Windows Downdate, if this fell into the wrong hands, the impact could be staggering. The exploit relies on a flaw in Windows Update to install older updates where certain vulnerabilities haven’t been patched yet. Leviev used the tool to downgrade dynamic link libraries (DLL), drivers, and even the NT kernel, which is a core component in Windows. This is achieved while bypassing all verification, and the result is entirely invisible and irreversible.

“I was able to make a fully patched Windows machine susceptible to thousands of past vulnerabilities, turning fixed vulnerabilities into zero-days and making the term ‘fully patched’ meaningless on any Windows machine in the world,” said Leviev in a SafeBreach post. “After these downgrades, the OS reported that it was fully updated and was unable to install future updates, while recovery and scanning tools were unable to detect issues.”

The Windows Downgrade tool.
Alon Leviev / SafeBreach

Leviev also discovered that the entire virtualization stack in Windows was also susceptible to this exploit; the researcher managed to downgrade Credential Guard’s Isolated User Mode Process, Hyper-V’s hypervisor, and Secure Kernel. Leviev even found “multiple ways” to turn off virtualization-based security (VBS) in Windows, and this was still possible even when UEFI locks were enforced.

“To my knowledge, this is the first time VBS’s UEFI locks have been bypassed without physical access,” Leviev said.

Windows Downdate can essentially undo every security patch ever created, then trick the PC into thinking everything is fine as it stealthily exposes it to hundreds of different threats. A tool such as this could wreak some serious havoc on any OS, and Leviev suspects that other operating systems, such as MacOS and Linux, might be at risk as well.

The good news is that Leviev intended to protect Windows users from a tool such as this, and the researcher reported his findings to Microsoft in February 2024. Microsoft issued two CVEs in response (CVE-2024-21302 and CVE-2024-38202) and appears to be hard at work fixing this vulnerability. Let’s hope that Microsoft is quicker to patch this exploit than non-ethical hackers are to use it to their own advantage.

Monica J. White
Monica is a computing writer at Digital Trends, focusing on PC hardware. Since joining the team in 2021, Monica has written…
Is Windows 11 acting up for you? This might be why
The Surface Pro 11 on a white table in front of a window.

This year's big Windows 11 update, 24H2, started a phased rollout in October and just became available to more PCs yesterday, December 4, as spotted by Windows Latest. To check if your PC is ready for it, just head to the settings page and check for updates -- if an update is not there for download yet, you'll have to wait until later in the rollout process.

Getting new things first isn't always a good thing when it comes to software, however. It can take quite a while for a new Windows build to be announced as "stable," and 24H2 is far from earning that title at the moment.

Read more
Microsoft won’t back down on Windows 11’s biggest hurdle
The Surface Pro 11 on a white table in front of a window.

Microsoft has reaffirmed that it will not lower the minimum hardware requirements for Windows 11, solidifying the need for a Trusted Platform Module (TPM) 2.0 and a compatible CPU. This decision leaves many older PCs ineligible for the upgrade. Microsoft emphasizes that these standards are vital for improved security and performance.

As per a recent blog post titled “TPM 2.0 – a necessity for a secure and future-proof Windows 11,” Microsoft reaffirmed its decision not to relax Windows 11’s strict hardware requirements. TPM 2.0 is a hardware-based security feature that protects sensitive data and ensures secure boot processes. Microsoft argues that such measures are nonnegotiable as the company continues to address rising cybersecurity threats. The minimum requirements include a list of approved CPUs, starting from AMD Ryzen 2000 and Intel 8th Gen processors, that offer advanced security features and better performance efficiency.

Read more
Samsung DeX for Windows is dead
Samsung DeX mode.

Samsung appears to have plans to retire support of its DeX Windows app upon releasing the OneUI 7 software update.

Android Authority recently observed updates on Samsung’s DeX page on its UK website that sais the DeX for Windows feature will be discontinued as of OneUI 7, which will be available in 2025. The company detailed that DeX for Windows users can transition to the Phone Link feature as an alternative.

Read more