Cyber: New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges (2026)

Cyber: New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges (2026)

A researcher known as "Chaotic Eclipse" has published a proof-of-concept exploit for a second Microsoft Defender zero-day, dubbed "RedSun," in the past two weeks, protesting how the company works with cybersecurity researchers. This exploit is for a local privilege escalation (LPE) flaw that grants SYSTEM privileges in Windows 10, Windows 11, and Windows Server on the latest April Patch Tuesday patches, when Windows Defender is enabled. "When Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that's supposed to protect decides that it is a good idea to just rewrite the file it found again to it's original location," explains the researcher. "The PoC abuses this behaviour to overwrite system files and gain administrative privileges." Will Dormann, principal vulnerability analyst at Tharros, has confirmed to BleepingComputer that the exploit for the new Microsoft Defender RedSun zero-day works and grants SYSTEM privileges on fully patched Windows 10, Windows 11, and Windows Server 2019 and later. "This Exploit uses the 'Cloud Files API', writes EICAR to a file using it, uses an oplock to win a volume shadow copy race, and uses a directory junction/reparse point to redirect the file rewrite (with new contents) to C:\Windows\system32\TieringEngineService.exe," Dormann wrote in a thread on Mastodon. "At this point, the Cloud Files Infrastructure runs the attacker-planted TieringEngineService.exe (which is the RedSun.exe exploit itself) as SYSTEM. Game over." Dormann says that some antivirus vendors on VirusTotal are detecting the exploit [VirusTotal] because the exploit executable contains an embedded EIRCAR (antivirus test file). However, he reduced detections [VirusTotal] by encrypting the EICAR string within the executable.

Source: BleepingComputer