⚠ Actively exploited
Added to CISA KEV on 2022-02-10. Federal agencies required to patch by 2022-02-24. Required action: Apply updates per vendor instructions..

CVE-2021-36934

CWE-12208 documents7 sources
Severity
7.8HIGH
EPSS
90.2%
top 0.41%
CISA KEV
KEV
Added 2022-02-10
Due 2022-02-24
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJul 22
KEV addedFeb 10
KEV dueFeb 24
CISA Required Action: Apply updates per vendor instructions.

Description

An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have the ability to execute code on a victim system to exploit this vulne

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages10 packages

NVDmicrosoft/windows_10_1809< 10.0.17763.2114
NVDmicrosoft/windows_10_1909< 10.0.18363.1734
NVDmicrosoft/windows_10_2004< 10.0.19041.1165
NVDmicrosoft/windows_10_20h2< 10.0.19042.1165
NVDmicrosoft/windows_10_21h1< 10.0.19043.1165

Patches

🔴Vulnerability Details

2
CVEList
Windows Elevation of Privilege Vulnerability2021-07-22
VulnCheck
Microsoft Windows SAM Local Privilege Escalation Vulnerability2021

💥Exploits & PoCs

1
Nuclei
MOVEit Transfer - SQL Injection

📋Vendor Advisories

2
CISA
Microsoft Windows SAM Local Privilege Escalation Vulnerability2022-02-10
Microsoft
Windows Elevation of Privilege Vulnerability2021-07-13

🕵️Threat Intelligence

2
Sentinelone
HiveNightmare | Protecting Windows 10 Security Account Manager Against CVE-2021-369342021-08-05
Sentinelone
HiveNightmare | Protecting Windows 10 Security Account Manager Against CVE-2021-369342021-08-05
CVE-2021-36934 (HIGH CVSS 7.8) | An elevation of privilege vulnerabi | cvebase.io