Security News > 2021 > July > Microsoft shares workarounds for new Windows 10 zero-day bug

Microsoft has shared a workaround for a Windows 10 zero-day vulnerability that can let attackers gain admin rights on vulnerable systems and execute arbitrary code with SYSTEM privileges.
"An elevation of privilege vulnerability exists because of overly permissive Access Control Lists on multiple system files, including the Security Accounts Manager database," Microsoft explains in a security advisory published on Tuesday evening.
As Microsoft further revealed, this zero-day vulnerability impacts all Windows client and server versions released during the last three years, since October 2018, starting with Windows 10 1809 and Windows Server 2019.
Microsoft recommends restricting access to the problematic folder AND deleting Volume Shadow Copy Service shadow copies to mitigate this issue.
Microsoft is still investigating the vulnerability and is working on a patch that will most likely be released as an out-of-band security update later this week.
Update: Added more info on affected Windows versions, deleting shadow copies.
News URL
Related news
- Windows 10 KB5051974 update force installs new Microsoft Outlook app (source)
- Microsoft patches Windows Kernel zero-day exploited since 2023 (source)
- Microsoft has finally fixed Date & Time bug in Windows 11 (source)
- Microsoft shares workaround for Windows security update issues (source)
- Microsoft February 2025 Patch Tuesday fixes 4 zero-days, 55 flaws (source)
- Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391) (source)
- Patch Tuesday: Microsoft Patches Two Actively Exploited Zero-Day Flaws (source)
- FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux (source)
- Microsoft fixes bug causing Windows Server 2025 boot errors (source)
- Microsoft to remove the Location History feature in Windows (source)