Microsoft’s Home windows 10 and the upcoming Home windows 11 variations have been discovered susceptible to a brand new native privilege escalation vulnerability that allows customers with low-level permissions entry Home windows system information, in flip, enabling them to unmask the working system set up password and even decrypt personal keys.
The vulnerability has been nicknamed “SeriousSAM.”
“Beginning with Home windows 10 construct 1809, non-administrative customers are granted entry to SAM, SYSTEM, and SECURITY registry hive information,” CERT Coordination Heart (CERT/CC) stated in a vulnerability note revealed Monday. “This will permit for native privilege escalation (LPE).”
The working system configuration information in query are as follows –
Microsoft, which is monitoring the vulnerability beneath the identifier CVE-2021-36934, acknowledged the problem, however has but to roll out a patch, or present a timeline for when the repair can be made accessible.
“An elevation of privilege vulnerability exists due to overly permissive Entry Management Lists (ACLs) on a number of system information, together with the Safety Accounts Supervisor (SAM) database,” the Home windows makers famous. “An attacker who efficiently exploited this vulnerability may run arbitrary code with SYSTEM privileges. An attacker may then set up packages; view, change, or delete information; or create new accounts with full consumer rights.
Profitable exploitation of the flaw, nonetheless, necessitates that the attacker already has a foothold and is in possession of the power to execute code on the sufferer system. Within the interim, the CERT/CC is recommending that customers limit entry to sam, system, and safety information and delete VSS shadow copies of the system drive.
The most recent disclosure additionally marks the third publicly disclosed unpatched bug in Home windows for the reason that launch of Patch Tuesday updates on July 13. Apart from CVE-2021-36934, two extra weaknesses affecting the Print Spooler part have additionally been found, prompting Microsoft to induce all customers to cease and disable the service to guard techniques towards exploitation.
Linux Distros Endure from “Sequoia” Privilege Escalation Flaw
It isn’t simply Home windows. Remediations have been launched for a safety shortcoming affecting all Linux kernel versions from 2014 that may be exploited by malicious customers and malware already deployed on a system to realize root-level privileges.
Dubbed “Sequoia” by researchers from cybersecurity agency Qualys, the problem has been assigned the identifier CVE-2021-33909 and impacts default installations of Ubuntu 20.04, Ubuntu 20.10, Ubuntu 21.04, Debian 11, and Fedora 34 Workstation. Pink Hat Enterprise Linux variations 6, 7, and eight are additionally affected by the vulnerability.
Particularly, the flaw considerations a size_t-to-int sort conversion vulnerability within the Linux Kernel’s “seq_file” file system interface, allowing an unprivileged native attacker to create, mount, and delete a deep listing construction whose whole path size exceeds 1GB, leading to privilege escalation on the susceptible host.
Individually, Qualys additionally disclosed a stack exhaustion denial-of-service vulnerability in systemd (CVE-2021-33910) that could possibly be exploited by unprivileged attackers to crash the software program suite and set off a kernel panic.