top of page

Shift + F10 Vulnerability

​

During MDT or ConfiMgr deployment of Windows 10, press Shift+F10 whilst Windows detects devices. A command prompt with System Privileges will pop up allowing all sorts of shenanigans and without being logged by SIEM, those agents won't be running yet.

​

Also during Windows 10 upgrades, that Bitlocker drive encryption is disabled allowing the same attack.

This is an old issue raised some 3 to 4 years ago.... Well, today on my test rig during a 1909 deployment, I was just curious, it can't still be vulnerable.... oops.

​

The fix is pretty straightforward, although I can't take credit, that belongs to Johan Arwidmark and this post here

#Declare Mount Folders for DISM Offline Update

​

$mountFolder1 = 'D:\Mount1'

​

$mountFolder2 = 'D:\Mount2'

​

$WinImage = 'D:\MDTDeployment\Operating Systems\Windows 10 x64 1909\sources'

​

#Mount install.wim to first mount folder

 

Mount-WindowsImage -ImagePath $WinImage\install.wim -Index 1 -Path $mountFolder1

​

#Mount winre.wim to second mount folder

 

Mount-WindowsImage -ImagePath $mountFolder1\Windows\System32\Recovery\winre.wim -Index 1 -Path $mountFolder2

 

#Create folder for DisableCMDRequest.TAG file in Winre.wim

 

New-Item $mountFolder2\Windows\setup\scripts -ItemType Directory

 

#Create DisableCMDRequest.TAG file for Winre.wim

 

New-Item $mountFolder2\Windows\setup\scripts\DisableCMDRequest.TAG -ItemType File

 

#Commit changes to Winre.wim

 

Dismount-WindowsImage -Path $mountFolder2 -Save

 

#Create folder for DisableCMDRequest.TAG in install.wim

 

New-Item $mountFolder1\Windows\setup\scripts -ItemType Directory

 

#Create DisableCMDRequest.TAG file for install.wim

 

New-Item $mountFolder1\Windows\setup\scripts\DisableCMDRequest.TAG -ItemType File

 

#Commit changes to Winre.wim

 

Dismount-WindowsImage -Path $mountFolder1 -Save

bottom of page