CVE-2021-36934

Scores

EPSS

0.910high91.0%
0%20%40%60%80%100%

Percentile: 91.0%

CVSS

7.8high3.x
0246810

CVSS Score: 7.8/10

All CVSS Scores

CVSS 3.x
7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
4.6

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Description

An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

An attacker must have the ability to execute code on a victim system to exploit this vulnerability.

After installing this security update, you must manually delete all shadow copies of system files, including the SAM database, to fully mitigate this vulnerabilty. Simply installing this security update will not fully mitigate this vulnerability. See KB5005357- Delete Volume Shadow Copies.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

msrcnvd

Related Vulnerabilities

Exploits

Exploit ID: CVE-2021-36934

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Vulnerable Software (8)

Type: Configuration

Vendor: *

Product: windows_10_1809

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",      "versionEndExcluding": "10.0.17763.2114",      "vulnerable": true    },    {      "cpe23uri"...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1909

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",      "versionEndExcluding": "10.0.17763.2114",      "vulnerable": true    },    {      "cpe23uri"...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_2004

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",      "versionEndExcluding": "10.0.17763.2114",      "vulnerable": true    },    {      "cpe23uri"...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_20h2

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",      "versionEndExcluding": "10.0.17763.2114",      "vulnerable": true    },    {      "cpe23uri"...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_21h1

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",      "versionEndExcluding": "10.0.17763.2114",      "vulnerable": true    },    {      "cpe23uri"...

Source: nvd

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19043.1165

Operating System: Windows 19043 build 1165

Identifier: KB5005033

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.18363.1734

Operating System: Windows 18363 build 1734

Identifier: KB5005031

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.2114

Operating System: Windows 17763 build 2114

Identifier: KB5005030

Source: msrc

End of list