Search...

Dangerous “RedSun” zero-day vulnerability discovered in Microsoft Defender

Dangerous “RedSun” zero-day vulnerability discovered in Microsoft Defender

The newly discovered zero-day vulnerability known as "RedSun" in the Microsoft Defender platform poses a serious threat to Windows users. This flaw allows an attacker with standard user privileges to achieve SYSTEM-level privileges on the affected system.

According to researches, the "RedSun" vulnerability can affect Windows 10, Windows 11, as well as Windows Server 2019 and later versions. The root cause of the vulnerability is a logic flaw in the file remediation mechanism located in MpSvc.dll, which is the core Malware Protection Engine component of Microsoft Defender. When Defender detects a malicious file carrying Cloud Files attributes (“cloud-tagged”), it attempts in certain cases to restore the file back to its original detection path. However, during this write operation, it does not verify whether the target directory has been redirected to another system directory through a junction point. The attacker exploits this exact weakness.

The exploit chain leverages the following legitimate Windows mechanisms:

  • Batch OPLOCK (Opportunistic Lock) – to precisely control the moment Defender attempts to access the file
  • Cloud Files API (CfApi.dll) – to create a placeholder file
  • Volume Shadow Copy Service (VSS) – to monitor Defender’s remediation stage
  • NTFS Junction Point – to redirect the write operation to the C:\Windows\System32 directory

 

According to the analysis, as a result of successful exploitation, the attacker-controlled file is placed into “C:\Windows\System32\TieringEngineService.exe” with SYSTEM privileges. It is then executed through the Storage Tiers Management COM Server invoked via CLSID {50d185b9-fff3-4656-92c7-e4018da4361d}, resulting in the attacker obtaining a SYSTEM shell. This process requires neither administrative privileges, nor UAC bypass, nor a kernel exploit.

Researchers have reported that the "RedSun" vulnerability has already been observed in real-world attacks. According to their findings, attackers placed the exploit files in user directories, including the Pictures and Downloads folders and renamed them to avoid suspicion. They then performed initial reconnaissance on the system using commands such as whoami /priv, cmdkey /list and net group.

At present, there is no official security patch available for the RedSun vulnerability. Therefore, users are strongly advised to regularly monitor Windows security updates, watch for unusual system activity and implement additional security measures where possible.

© 2011-2026 All rights reserved