Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2021-33779

Опубликовано: 13 июл. 2021
Источник: msrc
CVSS3: 8.1
EPSS Низкий

Описание

Windows AD FS Security Feature Bypass Vulnerability

FAQ

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

This vulnerability relates to Primary Refresh Tokens which are usually stored in TPM. These tokens are usually used for SSO for Azure AD accounts. The tokens are not encrypted in a strong enough manner, and an administrator with access to a vulnerable system could extract and potentially decrypt the token for reuse until the token expires or is renewed.

Обновления

ПродуктСтатьяОбновление
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
Windows Server, version 20H2 (Server Core Installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

Yes

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 77%
0.01078
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
почти 4 года назад

Windows AD FS Security Feature Bypass Vulnerability

CVSS3: 8.1
github
около 3 лет назад

Windows ADFS Security Feature Bypass Vulnerability

CVSS3: 6.5
fstec
почти 4 года назад

Уязвимость службы Active Directory Federation Services (AD FS) операционных систем Windows, позволяющая нарушителю обойти ограничения безопасности и повысить свои привилегии

EPSS

Процентиль: 77%
0.01078
Низкий

8.1 High

CVSS3