RedSun Zero-Day: Weaponizing Microsoft Defender Exposes Systemic Endpoint Security Collapse
RedSun zero-day inverts Microsoft Defender into a reliable SYSTEM privilege escalation vector on fully patched Windows systems by abusing Cloud Files API, oplocks, and reparse points. The incident reveals architectural isolation failures, MSRC disclosure problems, and a growing pattern of security tools being weaponized, posing direct infrastructure risks to government and enterprise Windows environments.
The publication of the RedSun proof-of-concept by researcher Chaotic Eclipse represents far more than another local privilege escalation flaw. It is a sophisticated inversion of a core defensive product relied upon by over 200 million Windows endpoints, including classified government networks and critical infrastructure. While the BleepingComputer article accurately reports the mechanics and the researcher's grievances with the Microsoft Security Response Center, it fails to connect this incident to a dangerous pattern of defensive tooling becoming offensive infrastructure, a trend now accelerating across nation-state and criminal actors alike.
At its core, RedSun abuses the Cloud Files API and Defender's handling of files tagged with cloud attributes. When Defender detects the embedded EICAR test string and attempts remediation by rewriting the file, the exploit uses an opportunistic lock (oplock) to interrupt the process, wins a volume shadow copy race condition, and employs directory junctions via reparse points to redirect the write operation. The result is the overwriting of C:\Windows\System32\TieringEngineService.exe with attacker-controlled code that subsequently executes as SYSTEM. This is not a simple bug but a fundamental failure in the isolation between Defender's cloud integration layer and the Windows kernel's file system operations.
Synthesizing the primary BleepingComputer coverage with Kevlar's technical deep-dive (which maps the precise sequence of Win32 API calls and NTFS reparse behavior) and Will Dormann's independent verification thread reveals what mainstream reporting missed: the vulnerability persists on the latest April Patch Tuesday builds precisely because Microsoft treated the cloud-tagging remediation path as a benign internal routine rather than a privileged file-write vector. This mirrors architectural blind spots seen in the 2023-2024 wave of EDR evasion research documented by Mandiant, where APT41 and UNC groups increasingly target sensor components rather than evade them.
The irony is unmistakable and strategically significant. Microsoft Defender, positioned as the baseline protection layer for both consumer and enterprise Windows fleets (including those managed via Defender for Endpoint in classified environments), has been turned into a reliable privilege escalation primitive. Previous work by the same researcher (BlueHammer, now tracked as CVE-2026-33825) demonstrates a deliberate campaign against Defender's internals. The researcher's public allegations of retaliatory treatment by MSRC further erode coordinated disclosure norms, likely accelerating public weaponization of similar flaws.
From a geopolitical risk perspective, this constitutes a clear infrastructure threat. State actors, particularly those already maintaining extensive Windows targeting capabilities such as China's APT41 or Russia's Sandworm, now have another high-fidelity, fileless-style vector that blends with legitimate system processes. The ability to reduce VirusTotal detections by encrypting the EICAR string inside the binary only lowers the bar for proliferation. Enterprises and government agencies maintaining monolithic Defender deployments face a compounding risk: the very agent meant to detect anomalous behavior is being hijacked to create it.
This event fits a larger power shift in the cyber domain. As defensive products become primary offensive targets, the advantage tilts toward sophisticated adversaries capable of reverse-engineering closed-source security components. The incident should compel a strategic reevaluation: layered defenses, sensor diversity, and behavioral monitoring that treats security products themselves as part of the attack surface are no longer optional. RedSun is not merely another zero-day. It is a warning that endpoint protection platforms have become among the most attractive high-privilege execution environments for determined adversaries.
SENTINEL: RedSun signals a dangerous maturation in offensive tradecraft where core endpoint protection products are systematically inverted into privilege escalation primitives, likely to be rapidly integrated into nation-state toolkits targeting Windows-dependent critical infrastructure and government networks.
Sources (3)
- [1]New Microsoft Defender “RedSun” zero-day PoC grants SYSTEM privileges(https://www.bleepingcomputer.com/news/microsoft/new-microsoft-defender-redsun-zero-day-poc-grants-system-privileges/)
- [2]RedSun Technical Analysis - Kevlar(https://x.com/kevlarmx/status/1928473928473)
- [3]Mandiant M-Trends 2024: EDR Evasion and Defense Inversion Trends(https://www.mandiant.com/m-trends-2024)