Windows Installer Elevation of Privilege Vulnerability (CVE-2021-41379)
Released: Nov 9, 2021
This
vulnerability allows local attackers to escalate privileges on affected
installations of Microsoft Windows. An attacker must first obtain the
ability to execute low-privileged code on the target system in order to
exploit this vulnerability.
The vulnerable component is not bound
to the network stack, and the attacker’s path is via read/write/execute
capabilities. Either: the attacker exploits the vulnerability by
accessing the target system locally (e.g., keyboard, console), or
remotely (e.g., SSH); or the attacker relies on User Interaction by
another person to perform actions required to exploit the vulnerability
(e.g., tricking a legitimate user into opening a malicious document)
The
attacker is authorized with (i.e., requires) privileges that provide
basic user capabilities that could normally affect only settings and
files owned by a user. Alternatively, an attacker with Low privileges
may have the ability to cause an impact only to non-sensitive resources.
The vulnerability affects all supported versions of Windows, including Windows 10, Windows 11, and Windows Server 2022.
reference - msrc.microsoft.com
Comments
Post a Comment