A vulnerability in Windows 10 allows hackers to corrupt the system with a single-line command. Due to the security breach, attackers can hide the malicious command in a shortcut or in ZIP files, among other vectors. In some cases, it is not even necessary for the user to open the file to trigger the execution of the code that triggers errors on the hard disk.
According to website information Bleeping Computer, researcher Jonas L has been warning of the vulnerability since August 2020. When exploited, the bug instantly affects NTFS-formatted hard drives.
After executing the command, which occurs when trying to access the NTFS $ i30 attribute in a folder in a specific way, Windows displays the message “the file or directory is damaged and unreadable” and prompts you to restart your computer to repair the disco. According to Jonas L, this gap was opened from Windows 10 build 1803, a 2018 update, and remains unpatched.
The command can corrupt any drive, not just the Local Disk (C :). The researcher also points out that a registry key that could be used to diagnose this failure is not working.
Still according to the Bleeping Computer, there are more sophisticated ways to exploit the vulnerability. One allows attackers to create a Windows shortcut file and set the location of the icon to C: : $ i30: $ bitmap, which would trigger the vulnerability even if the user never opened the file.
Microsoft said it is already aware of the bug and will provide updates to the affected devices “as soon as possible”.
With information: Bleeping Computer