Saturday, May 2, 2026

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat to IT administrators and developers worldwide.

The vulnerability enables attackers to exploit DLL injection techniques to execute malicious code, putting systems at risk of compromise.

Despite being disclosed to Microsoft over 90 days ago, the issue remains unresolved, leaving users reliant on manual mitigations to safeguard their environments.

Microsoft Sysinternals is a widely used suite of tools designed for system analysis, troubleshooting, and malware investigation. 

Popular utilities, such as Process ExplorerAutoruns, and Bginfo, are integral to system administrators for monitoring processes, configurations, and services.

However, unlike many Windows components that receive regular updates through the Windows Update infrastructure, Sysinternals tools require manual updates.

This lack of integration creates a significant window of risk when vulnerabilities, such as this one, are discovered.

Details of the Vulnerability

According to the Cyber Security News report, the vulnerability arises from how Sysinternals tools handle dynamic-link library (DLL) file loading.

These tools prioritize untrusted paths—such as the current working directory (CWD) or network paths—over safe, system-designated directories.

This allows attackers to stage malicious DLLs in the same location as a legitimate Sysinternals executable.

How the Exploit Works:

  1. Crafting a Malicious DLL: An attacker creates a DLL (e.g., cryptbase.dll or TextShaping.dll) embedded with malicious payloads.
  2. File Placement: The DLL is placed alongside a legitimate Sysinternals executable (e.g., Bginfo.exe).
  3. Execution: When the targeted application is executed, it loads the malicious DLL instead of the trusted one.
  4. Result: The attacker’s code runs with the user’s system privileges, potentially leading to full system compromise.

Real-World Application: Bginfo Trojan Deployment

One of the most glaring examples of exploitation involves the Bginfo tool, used in enterprise environments to display desktop system information.

In a simulated scenario, an attacker places a malicious DLL on a shared network directory. During system startup, a script executes Bginfo.exe directly from the network path.

The tool, in turn, loads the malicious DLL instead of the legitimate one, enabling the proliferation of malware like Trojans or backdoors across multiple systems. A technical writeup by the researcher cautions:

“If the network path contains a prepared DLL, each client can be automatically compromised during the startup process.”

The vulnerability was responsibly disclosed to Microsoft on October 28, 2024, in line with industry best practices.

However, Microsoft classified the issue as a “defense-in-depth” enhancement, meaning it does not consider the vulnerability a critical flaw but rather an issue to be addressed via secure usage practices.

Microsoft’s stance emphasizes running Sysinternals tools from local directories rather than network locations.

The researcher, however, argues this approach overlooks real-world scenarios where tools are executed directly from shared directories. As of February 2025, the vulnerability remains unpatched, exposing organizations to significant risk.

Sysinternals tools are indispensable for IT administration and malware analysis, yet this vulnerability highlights their inherent risks.

While trusted for identifying malicious behavior on systems, these tools now face scrutiny for enabling DLL injection attacks themselves. Until Microsoft addresses the issue, users must remain vigilant and proactive in securing their environments.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Hot this week

How To Access Dark Web Anonymously and know its Secretive and Mysterious Activities

What is Deep Web The deep web, invisible web, or...

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything...

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates...

Russian Hackers Bypass EDR to Deliver a Weaponized TeamViewer Component

TeamViewer's popularity and remote access capabilities make it an...

Web Server Penetration Testing Checklist – 2026

Web server pentesting is performed under three significant categories: identity,...

Massive Facebook Phishing Operation Leverages AppSheet, Netlify, and Telegram

Cybersecurity researchers at Guardio Labs have uncovered a massive...

cPanelSniper PoC Exploit Disclosed as 44,000 Servers Reportedly Compromised

A critical zero-day vulnerability in cPanel and WebHost Manager...

Criminal IP and Securonix ThreatQ Collaborate to Enhance Threat Intelligence Operations

Torrance, United States / California, May 1st, 2026, CyberNewswire Criminal...

EtherRAT Uses SEO Poisoning and Fake GitHub Pages to Target Enterprise Admins

A newly uncovered cyber campaign dubbed “EtherRAT” is raising...

New Android Spyware Platform Enables Rebranding and Resale

A newly discovered Android spyware platform is raising concerns...

CAPTCHA and ClickFix Abuse Fuels Credential Theft Surge

Attackers are increasingly combining QR codes, fake CAPTCHA gates,...

DDoS Malware Targets Jenkins to Hit Valve Game Servers

A new DDoS botnet that abuses exposed Jenkins servers...

Related Articles

Recent News