{"id":13944,"date":"2023-03-24T12:32:48","date_gmt":"2023-03-24T12:32:48","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=13944"},"modified":"2023-03-24T12:32:48","modified_gmt":"2023-03-24T12:32:48","slug":"acropalypse-vulnerability-for-windows","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/acropalypse-vulnerability-for-windows\/","title":{"rendered":"The aCropalypse Vulnerability Poses a Threat Not Only to Pixel, but Also to Windows"},"content":{"rendered":"<p><h4>Information security experts have discovered that the aCropalypse vulnerability, which allows restoring the original image edited on a Google Pixel device (using the Markup tool), is turning into a 0-day for Windows.<\/h4>\n<\/p>\n<p>Let me remind you that we also wrote that <a href=\"\/blogs\/youtube-and-pixel-smartphones\/\"><strong>YouTube<\/strong> Video Causes <strong>Pixel<\/strong> Smartphones to Reboot<\/a>, and also that <a href=\"\/blogs\/0-day-vulnerability-in-windows-search\/\">Information Security Specialists Discovered a <strong>0-day<\/strong> Vulnerability in <strong>Windows Search<\/strong><\/a>.<\/p>\n<p>Also information security specialists reported that the <a target=\"_blank\" href=\"https:\/\/howtofix.guide\/google-pixel-bug-prevented-users-from-calling-911\/\" rel=\"noopener nofollow\"><strong>Google<\/strong> Pixel bug prevented users from calling 911<\/a>.<\/p>\n<p>It turned out that the <strong>aCropalypse<\/strong> bug also works for images cropped using the Windows <strong>Snipping Tool<\/strong>, which means that previously deleted content can also be restored for these images.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/Restoring-a-shaded-bank-card-number.png\" alt=\"aCropalypse vulnerability for Windows\" title=\"\"><br \/>\nRestoring a shaded bank card number<\/p>\n<p>The aCropalypse vulnerability (<strong>CVE-2023-21036<\/strong>) was discovered by cybersecurity experts <strong>Simon Aarons<\/strong> and <strong>David Buchanan<\/strong>. <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/www.da.vidbuchanan.co.uk\/blog\/exploiting-acropalypse.html\">It allows restoring any images<\/a> modified using the built-in <strong>Markup<\/strong> screenshot editor, which appeared on Pixel smartphones in 2018 with the release of Android 9.0 Pie.<\/p>\n<p>In the case of the Pixel, the problem lies in how the image file is opened for editing: the cropped data still remains in the new saved image, <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/acropalypse.app\/\">allowing about 80% of the original image to be restored<\/a>.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/Cropping-images.jpg\" alt=\"aCropalypse vulnerability for Windows\" title=\"\"><\/p>\n<p>The researchers warned that aCropalypse could expose users&#8217; sensitive information if they had once edited an image with Markup and then shared the file with other people or even posted it online.<\/p>\n<p>Because some platforms don&#8217;t compress user-uploaded media, the sensitive data contained in the images may have been left untouched and stored somewhere online all these years. In this light, the example given by Aarons with the blurred bank card number shown above is very revealing.<\/p>\n<p>It looks like the aCropalypse issue has gotten a lot worse now, as programmer <strong>Chris Blume<\/strong> has discovered that <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/ProgramMax\/status\/1638217206180741121\">the vulnerability also affects the Windows Snipping Tool<\/a>.<\/p>\n<p>When you open a file in the Snipping Tool and overwrite the existing file, the same thing happens as in Markup: instead of truncating the unused data, the tool puts the unused data at the end of the file, which eventually allows to partially restore it.<\/p>\n<p><strong>Bleeping Computer<\/strong> and well-known information security expert <strong>Will Dormann<\/strong> confirm that <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-11-snipping-tool-privacy-bug-exposes-cropped-image-content\/\">the vulnerability actually works in Windows 10 and 11<\/a>. So, Dormann suggested a simple test: copy any image (to have a backup), then open it with the Snipping Tool \u201d and crop it to a much smaller size. Save the file and compare the sizes of the cropped and original files. As you can see in the screenshot below, the file sizes are the same.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/file-sizes-are-the-same.jpg\" alt=\"aCropalypse vulnerability for Windows\" title=\"\"><\/p>\n<p>Bleeping Computer journalists went even further. They note that the PNG file specification requires that a PNG image file always ends with an &#8220;IEND&#8221; data fragment, with any data added after it being ignored by image editors and viewers. And unused data remains in the file after IEND.<\/p>\n<p>After all the manipulations described above, the journalists decided to &#8220;see&#8221; this data.<\/p>\n<p>Since the <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/acropalypse.app\/\">acropalypse.app<\/a> online application does not work with Windows files, David Buchanan shared with the publication a Python script that can be used to restore Windows files. The successful result of this script, which the expert <a rel=\"noopener noreferrer nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/David3141593\/status\/1638272152087547911\">does not intend<\/a> to make public yet, can be seen below.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/restore-image.jpg\" alt=\"aCropalypse vulnerability for Windows\" title=\"\"> <\/p>\n<p>It is noted that not all PNG files are affected by this problem, and not all originals for all files can be completely restored.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">Your original PNG was saved with one zlib block (usually for \u201coptimized\u201d PNGs), but real screenshots are saved with multiple zlib blocks (which is required for my exploit to work).<span class=\"su-quote-cite\">Buchanan told reporters.<\/span><\/div><\/div>\n<p>In addition, opening a PNG file in a graphics editor (such as Photoshop) and saving it as another file will delete unused data at the end and cannot be recovered.<\/p>\n<p>It is worth saying that the Snipping Tool works exactly the same with JPG files, saving the &#8220;cropped&#8221; data when overwritten. However, Buchanan says that his exploit does not yet work with JPGs, although recovery of such images is most likely possible.<\/p>\n<p><strong>Microsoft<\/strong> representatives told the media that they are already aware of this problem. The company is currently investigating the matter, and it promises it will &#8220;take steps to protect customers if necessary.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information security experts have discovered that the aCropalypse vulnerability, which allows restoring the original image edited on a Google Pixel device (using the Markup tool), is turning into a 0-day for Windows. Let me remind you that we also wrote that YouTube Video Causes Pixel Smartphones to Reboot, and also that Information Security Specialists Discovered [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":13951,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[257,315,58,1195],"class_list":{"0":"post-13944","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-0-day","9":"tag-exploit","10":"tag-google","11":"tag-pixel"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/03\/aCropalypse-vulnerability-for-Windows.webp","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=13944"}],"version-history":[{"count":2,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13944\/revisions"}],"predecessor-version":[{"id":13950,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/13944\/revisions\/13950"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/13951"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=13944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=13944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=13944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}