An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creat…
An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
https://cwe.mitre.org/data/definitions/269.html →Open in CWE collection →An adversary identifies a Rest HTTP (Get, Put, Delete) style permission method allowing them to perform various malicious actions upon server data due to lack of access control mechanisms implemented within the application service accepting HTTP messages.
https://capec.mitre.org/data/definitions/58.html →Open in CAPEC collection →An adversary is able to exploit features of the target that should be reserved for privileged users or administrators but are exposed to use by lower or non-privileged accounts. Access to sensitive information and functionality must be controlled to ensure that only authorized users are able to access these resources.
https://capec.mitre.org/data/definitions/122.html →Open in CAPEC collection →An adversary exploits a weakness enabling them to elevate their privilege and perform an action that they are not supposed to be authorized to perform.
https://capec.mitre.org/data/definitions/233.html →Open in CAPEC collection →| Product | Vendor | Status |
|---|---|---|
| windows_10_1507 | * | Exploited |
| windows_10_1607 | * | Exploited |
| windows_10_1709 | * | Exploited |
| windows_10_1803 | * | Exploited |
| windows_10_1809 | * | Exploited |
| windows_10_1903 | * | Exploited |
| windows_7 | * | Exploited |
| windows_8.1 | * | Exploited |
| windows_rt_8.1 | * | Exploited |
| windows_server_1803 | * | Exploited |
| windows_server_1903 | * | Exploited |
| windows_server_2008 | * | Exploited |
| windows_server_2012 | * | Exploited |
| windows_server_2016 | * | Exploited |
| windows_server_2019 | * | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |
| Windows | Microsoft | Exploited |