Описание
Microsoft Brokering File System Elevation of Privilege Vulnerability
FAQ
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could potentially gain the ability to authenticate against a remote host using the current user’s credentials.
How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by taking advantage of a security oversight in the driver’s management of network path validations, which could circumvent the established security protocols designed to safeguard user credentials during application interactions with remote hosts. This could potentially grant unauthorized access to network resources and facilitate the execution of unauthorized actions under the assumed identity of a legitimate user.
According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?
In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Windows Server 2022, 23H2 Edition (Server Core installation) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
8.8 High
CVSS3
Связанные уязвимости
Microsoft Brokering File System Elevation of Privilege Vulnerability
Microsoft Brokering File System Elevation of Privilege Vulnerability
Уязвимость файловой системы Brokering File System (BFS) операционной системы Windows Server, позволяющая нарушителю повысить свои привилегии
EPSS
8.8 High
CVSS3