vimarsana.com


Copy
Move over, PrintNightmare. Microsoft has another privilege-escalation hole in Windows that can be potentially exploited by rogue users and malware to gain admin-level powers.
Meanwhile, a make-me-root hole was found in recent Linux kernels.
Recent builds of Windows 10, and the preview of Windows 11, have a misconfigured access control list (ACL) for the Security Account Manager (SAM), SYSTEM, and SECURITY registry hive files.
As a result of this blunder, non-administrative users may read these databases, if a VSS shadow copy of the system drive is present, and potentially use their contents to gain elevated privileges. According to a US-CERT advisory, the issue appears to affect Windows 10 build 1809 and newer.

Related Keywords

,Benjamin Delpy ,Jonas Lykkegaard ,Microsoft ,Security Account Manager ,Windows Update ,Access Control Lists ,Security Accounts Manager ,Local Privilege Escalation ,மைக்ரோசாஃப்ட் ,பாதுகாப்பு எண்ணுதல் மேலாளர் ,ஜன்னல்கள் புதுப்பிப்பு ,நுழைவு கட்டுப்பாடு பட்டியல்கள் ,பாதுகாப்பு கணக்குகள் மேலாளர் ,

© 2025 Vimarsana

vimarsana.com © 2020. All Rights Reserved.