Security News > 2021 > July > How to Mitigate Microsoft Windows 10, 11 SeriousSAM Vulnerability

How to Mitigate Microsoft Windows 10, 11 SeriousSAM Vulnerability
2021-07-26 04:21

Microsoft Windows 10 and Windows 11 users are at risk of a new unpatched vulnerability that was recently disclosed publicly.

As we reported last week, the vulnerability - SeriousSAM - allows attackers with low-level permissions to access Windows system files to perform a Pass-the-Hash attack.

Attackers can exploit this vulnerability to obtain hashed passwords stored in the Security Account Manager and Registry, and ultimately run arbitrary code with SYSTEM privileges.

SeriousSAM vulnerability, tracked as CVE-2021-36934, exists in the default configuration of Windows 10 and Windows 11, specifically due to a setting that allows 'read' permissions to the built-in user's group that contains all local users.

Because there is no official patch available yet from Microsoft, the best way to protect your environment from SeriousSAM vulnerability is to implement hardening measures.

Automatically generate the most accurate possible impact analysis report - hardening automation tools 'learns' your production dependencies and report to you the potential impact of each policy rule.


News URL

http://feedproxy.google.com/~r/TheHackersNews/~3/HfUWu591DT8/how-to-mitigate-microsoft-windows-10-11.html

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2021-07-22 CVE-2021-36934 Unspecified vulnerability in Microsoft products
<p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database.
local
low complexity
microsoft
7.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Microsoft 706 781 4550 4600 3628 13559