2025-09-26 –, Off-Main Track
Windows COM (Component Object Model) is an essential yet complex part of the OS, responsible for enabling interprocess communication. While well-documented on the surface, COM's internal behaviors by many researcher by still hide attack surfaces that are underexplored.
In this talk, I will take you through my personal journey of discovering a pre-authentication COM vulnerability in Windows. Starting from understanding COM internals and how to access their stubs simply, then fuzzing them using harnesses built on kAFL and WTF, I’ll show the steps that led to a successful vulnerability discovery.
I’ll also briefly examine previous COM-related CVEs and some researches, what patterns they share, and how I used those lessons in my own approach. Finally, I will present the technical root cause of the vulnerability I found (Case-88235, CVE-2025-29841), followed by a demo of how it could be exploited in a pre-auth scenario.
This talk is intended for vulnerability researchers, reverse engineers, and Windows security enthusiasts interested in novel pre-auth attack vectors and practical bug-hunting methodology.
- Interested in find vulnerability in
Windows (kernel, user application), binary exploit - MSI, eScan Hall Of Fame (with BoB.0DayResearchLab)
- Presentation Member of CODEBLUE 2024 (1-Click-Fuzz: Systematically Fuzzing the Windows Kernel Driver with Symbolic Execution.)
- CVE-2024-20653, CVE-2024-21442, CVE-2024-21445 in windows kernel, and find many CVE from that project
- M.S. Computer Science in Sejong University