← Back to exposed-win-zero-days

Stuxnet Zero-Days

Windows Zero-Day Exploits Used in Stuxnet

Overview

Stuxnet is one of the most sophisticated cyber weapons ever discovered, famously targeting Iran's nuclear facilities in 2010. It exploited four previously unknown (zero-day) vulnerabilities in Microsoft Windows to gain control of industrial systems and cause physical damage to centrifuges.

Stuxnet was designed to spread via USB drives and local networks, and its zero-days allowed it to evade detection and execute malicious commands on PLCs (Programmable Logic Controllers).

Zero-Day Vulnerabilities Used by Stuxnet

Technical Details

Exploitation

Stuxnet's zero-days were used in a multi-stage attack:

  1. Infect systems via USB drives using the LNK/PIF vulnerability.
  2. Escalate privileges using the Print Spooler and Task Scheduler vulnerabilities.
  3. Spread across the network using the Server Service vulnerability.
  4. Deploy malicious code to PLCs, causing physical damage to centrifuges.

Stuxnet's use of zero-days made it extremely difficult to detect and mitigate, and it set a precedent for state-sponsored cyber warfare.

Affected Systems

Patch Information

Microsoft released patches for all four zero-day vulnerabilities in 2010 after Stuxnet was discovered. Users and administrators were urged to apply the updates immediately to prevent further exploitation.

For systems that could not be patched, Microsoft recommended disabling vulnerable services and monitoring for suspicious activity.

Mitigation

References