Site icon GEEKrar

Windows 10 and 11 found a vulnerability that allows anyone to gain administrator rights

Exploiting the problem allows you to escalate privileges and gain access to sensitive files in the registry database.

Security researcher Jonas Lykkegaard reported a dangerous vulnerability ( CVE-2021-36934 ) in Windows 10 and Windows 11. The exploitation of the problem, dubbed SeriousSAM and HiveNightmare, allows a local user to elevate their privileges and gain access to the confidential files registry databases.

The Windows Registry acts as a configuration repository for the Windows operating system and contains password hashes, user preferences, configuration settings for applications, system decryption keys, and more.

The database files associated with the Windows registry are stored in the C: \ Windows \ system32 \ config folder and are split into different files such as SYSTEM, SECURITY, SAM, DEFAULT, and SOFTWARE. Since these files contain confidential information about all user accounts on the device and security tokens used by Windows features, they are not allowed to be viewed by non-elevated users.

This is especially important for the Security Account Manager (SAM) file because it contains password hashes for all users on the system that attackers can use to verify their identity.

The Windows 10 and Windows 11 registry files associated with SAM and all other registry databases are available to the low-privileged Users group on the device, Lyckegaard said. While testing Windows 11, the technician found that although the OS restricts access to these files for low-level users, the available copies of the files are stored in shadow copies. This issue appeared in Windows 10 code back in 2018, after the release of version 1809.

As temporary measures to prevent exploitation of the vulnerability, Microsoft experts recommend restricting access to the vulnerable folder and deleting shadow copies.

Exit mobile version