Multiple Critical Vulnerabilities

Executive Summary

Due to an unusual increase in Critical vulnerabilities found on Windows operating systems, Cyberint’s Research Team has decided to release this bulletin to alert on the potential impact. We suspect that threat actors and updated malware may attempt to exploit these vulnerabilities to further impact potential victims.

This bulletin will be expanded at the end of the month, as part of the Monthly Vulnerability Bulletin.

The reason for this bulletin lies at 2 newly discovered vulnerabilities:

  1. <No CVE assigned yet> – Corrupt NTFS OS partition without user interaction.
  2. <No CVE assigned yet> – Trigger a BSOD by trying to access a system path.
  3. CVE-2020-1398 – Potential bypass of Bitlocker protected systems, including Lock Screen bypass.

NTFS Corruption Vulnerability

Published by a known vulnerability researcher, jonasLyk, it is possible to cause disk partition corruption by executing a cd command as a low privilege user, to a unique path, which causes the Windows Operating System to alert the user to a corrupted partition and force a restart.

Whilst technical details are scarce, and the exact reason for the issue being unknown at this time, affected Windows builds using the NTFS file system include those from 1803 all the way to 20H2.

According to SANS, the $bitmap is an attribute reserved for files marked as deleted, while $i30 is marked as an NTFS index attribute.

In most of the cases observed, it may not be possible to recover from the initial system restart and the operating system may remain in a ‘boot-loop’.

Concern arises from, and as tested by Cyberint’s Research, the threat of nefarious logic links, such as an icon, HTML link or even an icon archived within a ZIP file could cause the issue and therefore to trigger without user interaction.

Furthermore, some researchers speculate that the issue could impact the MFT (Master File Table) resulting in a complete loss of data although these payloads have not been observed thus far.

Please note that executing the following payloads could trigger this vulnerability and as such are provided as images to minimize any risk.

There are 3 payloads involved, which are similar:

  1. CD payload.
  2. Icon payload.
  3. HTML payload.


By interactively performing a CD command to the following path:

Multiple Critical Vulnerabilities_1

The user will be alerted by the following error, forcing them to restart:

Multiple Critical Vulnerabilities_2

Multiple Critical Vulnerabilities_3

This causes the following error in the event log:

Multiple Critical Vulnerabilities_4

Icon Payload

By creating a shortcut file (lnk) and pointing the icon to the path mentioned above, threat actors can deliver a ZIP file containing a malicious payload.

As the archive is extracted, the payload is triggered by an attempt to access the icon file and causes the same NTFS corruption.

HTML Payload

It was also observed that pointing the following payload in static HTML files or email messages could cause the corruption issue:

Multiple Critical Vulnerabilities_5

This payload could be potentially delivered and presented on websites or within email messages although no samples have as yet been observed in the wild.

So far, Cyberint’s Research was able to trigger it using static HTML files.

Blue Screen of Death by Reading a File

Another potential issue that is being investigated, is related to the Console Multiplexer Driver in Windows.

This driver is used by different applications to communicate directly with the harddrive without going through the file system.

By trying to access the path mentioned, without providing key attributes, the operating system crashes due to improper error checking on behalf of the driver’s function.

The versions affected and validated include Windows builds from 1709 to 20H2.

Please note that executing the following command will trigger the BSOD.

By trying to access the mentioned path, either by file explorer or a file editor, the system will crash within a minute:


Multiple Critical Vulnerabilities_6

After couple of seconds, this error message appears:

Multiple Critical Vulnerabilities_7

After approximately a minute, this error appears:

Multiple Critical Vulnerabilities_8

As can be seen from the error message, condrv.sys has caused the issue.


Released in July 2020, this vulnerability refers to the ability of an attacker to bypass Bitlocker and the console Lock Screen, by physically attacking a vulnerable endpoint.

In order to achieve this, the attacker must have a physical access to the machine, therefore remote execution is not possible to achieve.

By combining the usage of Sticky-Keys and allowing the automatic execution of files from external devices, attackers are able to create an administrative account and use it to sign on.

Pressing on SHIFT 5 times will trigger the following window:

Multiple Critical Vulnerabilities_9

As this window has a clickable ‘blue’ link to the Windows 10 Settings application, the attacker is then able to enable Autoplay of an external device which contains a malicious payload:

Multiple Critical Vulnerabilities_10

This allows the attacker to open up Explorer, executing the malicious payload from within Bitlocker, creating another folder under NT Authority\System, abusing the permissions provided.

CVSS according to Microsoft is 6.8 / 6.1.


  • Make sure system patches are enabled and implemented.
  • Blocking the paths mentioned above may lead to unwanted side effects.
  • Until a mitigation or a compensating control is found, Cyberint recommends on monitoring the following errors on Windows endpoints for any exploitation attempts:
    • Error 55, sourced at NTFS
    • Crashes, sourced at condrv.sys

Uncover your compromised credentials from the deep and dark web

Fill in your business email to start