Security News > 2021 > July > Microsoft shares workaround for Windows 10 SeriousSAM vulnerability

Microsoft has shared a workaround for a Windows 10 zero-day vulnerability that can let attackers gain admin rights on vulnerable systems and execute arbitrary code with SYSTEM privileges.
"An elevation of privilege vulnerability exists because of overly permissive Access Control Lists on multiple system files, including the Security Accounts Manager database," Microsoft explains in a security advisory published on Tuesday evening.
As Microsoft further revealed, this zero-day vulnerability impacts all Windows client and server versions released during the last three years, since October 2018, starting with Windows 10 1809 and Windows Server 2019.
Microsoft recommends restricting access to the problematic folder AND deleting Volume Shadow Copy Service shadow copies to mitigate this issue.
Microsoft is still investigating the vulnerability and is working on a patch that will most likely be released as an out-of-band security update later this week.
Update: Added more info on affected Windows versions, deleting shadow copies.
News URL
Related news
- Windows 10 KB5051974 update force installs new Microsoft Outlook app (source)
- FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux (source)
- Microsoft fixes bug causing Windows Server 2025 boot errors (source)
- Microsoft to remove the Location History feature in Windows (source)
- Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability (source)
- Microsoft testing fix for Windows 11 bug breaking SSH connections (source)
- Microsoft launches ad-supported Office apps for Windows users (source)
- Microsoft tests ad-supported Office apps for Windows users (source)
- Windows 10 KB5052077 update fixes broken SSH connections (source)
- Microsoft fixes Outlook drag-and-drop broken by Windows updates (source)