Site icon WinCert

Microsoft is trying to fix a bug that easily corrupts NTFS file system

A security researcher Jonas L has discovered an NTFS vulnerability that impacts Windows 8/8.1 and many Windows 10 versions.

Unfortunately, this is a long-existing flaw that has not been fixed yet and it became exploitable starting with Windows 10 v1803 and continues to v20H2 which is the latest major Windows 10 release.

Apparently, even the unsupported Windows XP operating system is affected by this bug, but Windows 7 is not.

This vulnerability that corrupts the NTFS file system can be exploited with a single command, shortcut in a ZIP archive, or even by a malformed HTML file.

A simple command that is executed with a privileged account or in an elevated CMD window corrupts an NTFS hard drive will result in a system restart prompting the user to repair the corrupted disk records.

Please do not run this command on your devices that contain important data since you WILL damage the file system and even lose your data. Use this command at your own risk and only on a test system.

Here’s the command line that causes havoc on Windows NTFS volumes:

cd c:\:$i30:$bitmap

The key issue lies in the $i30 which is an NTFS Index Attribute that containing a list of files and subfolders from NTFS directories.

Once the above command has been executed you will receive the following Security and Maintenance notification:

Restart to repair drive errors. Click to restart your PC.

Once the PC is rebooted Windows will start the CheckDisk app and will fix the file system.

Apart from running this command in the command prompt, this flaw can also be exploited by creating an Internet shortcut file (.url) with an icon location set to C:\:$i30:$bitmap. Once the system tries to display this icon the system will instantly become corrupted.

Another way is to use this .URL shortcut file in a ZIP archive, ISO, VHD or VHDX files. The corruption will start as soon as the user extracts the ZIP archive or mounts ISO, VHD, VHDX files.

Some users reported that pasting the ‘:$i30’ string into the browser address also results in a corrupted file system.

Currently, there is no fix for this flaw and until Microsoft releases a fix, please be extremely careful when using .ZIP, ISO, VHD or VHDX files from untrusted sources.

Exit mobile version