Security News > 2021 > July > Microsoft shares workaround for Windows 10 SeriousSAM vulnerability

Microsoft has shared a workaround for a Windows 10 zero-day vulnerability that can let attackers gain admin rights on vulnerable systems and execute arbitrary code with SYSTEM privileges.
"An elevation of privilege vulnerability exists because of overly permissive Access Control Lists on multiple system files, including the Security Accounts Manager database," Microsoft explains in a security advisory published on Tuesday evening.
As Microsoft further revealed, this zero-day vulnerability impacts all Windows client and server versions released during the last three years, since October 2018, starting with Windows 10 1809 and Windows Server 2019.
Microsoft recommends restricting access to the problematic folder AND deleting Volume Shadow Copy Service shadow copies to mitigate this issue.
Microsoft is still investigating the vulnerability and is working on a patch that will most likely be released as an out-of-band security update later this week.
Update: Added more info on affected Windows versions, deleting shadow copies.
News URL
Related news
- Microsoft Patches 125 Flaws Including Actively Exploited Windows CLFS Vulnerability (source)
- Microsoft: Windows CLFS Vulnerability Could Lead to ‘Widespread Deployment and Detonation of Ransomware’ (source)
- Microsoft silently fixes Start menu bug affecting Windows 10 PCs (source)
- Microsoft will update Office apps on Windows 10 until 2028 (source)
- Microsoft confirms May Windows 10 updates trigger BitLocker recovery (source)
- Microsoft's killing script used to avoid Microsoft Account in Windows 11 (source)
- Microsoft tests new Windows 11 tool to remotely fix boot crashes (source)
- New Windows 11 trick lets you bypass Microsoft Account requirement (source)
- Microsoft adds hotpatching support to Windows 11 Enterprise (source)
- Microsoft starts testing Windows 11 taskbar icon scaling (source)