Skip to content

Windows OOBE Security Flaw Allows Full Admin Access

A newly discovered vulnerability in Windows' initial setup process lets users easily gain full admin access. Be cautious until Microsoft releases a patch.

In the image there is a bug on the white surface.
In the image there is a bug on the white surface.

Windows OOBE Security Flaw Allows Full Admin Access

Microsoft's Windows Out-of-Box-Experience (OOBE), the initial setup process for new devices, has been found to contain a significant security vulnerability. This flaw allows users to bypass security restrictions and gain full administrative access to command prompt functions during the initial setup process.

The vulnerability exploits the 'defaultuser0' system account, which is a member of the local administrators group, providing extensive system access. Researchers have discovered an alternative method to launch the 'Run' dialog within OOBE, using the Win+R shortcut after focusing on another window like the on-screen keyboard tool. This enables users to launch an elevated command shell with administrator rights via the 'defaultuser0' account, circumventing the known limitations of the Shift+F10 shortcut. The 'cmd /k' command can be used to launch the command shell, granting users full administrative access to command prompt functions.

Microsoft has been notified about this security flaw, and it is recommended that users remain cautious during the initial setup process of their Windows devices until a patch is released. The vulnerability highlights the importance of robust security measures during the early stages of device access.

Read also:

Latest