Логотип exploitDog
bind:CVE-2021-26887
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-26887

Количество 4

Количество 4

nvd логотип

CVE-2021-26887

больше 4 лет назад

<p>An elevation of privilege vulnerability exists in Microsoft Windows when Folder redirection has been enabled via Group Policy. When folder redirection file server is co-located with Terminal server, an attacker who successfully exploited the vulnerability would be able to begin redirecting another user's personal data to a created folder.</p> <p>To exploit the vulnerability, an attacker can create a new folder under the Folder Redirection root path and create a junction on a newly created User folder. When the new user logs in, Folder Redirection would start redirecting to the folder and copying personal data.</p> <p>This elevation of privilege vulnerability can only be addressed by reconfiguring Folder Redirection with Offline files and restricting permissions, and NOT via a security update for affected Windows Servers. See the <strong>FAQ</strong> section of this CVE for configuration guidance.</p>

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2021-26887

больше 4 лет назад

Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-xphp-jrmh-9rjj

около 3 лет назад

Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2021-01677

больше 4 лет назад

Уязвимость реализации технологии перенаправления папок Folder Redirection операционных систем Windows, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-26887

<p>An elevation of privilege vulnerability exists in Microsoft Windows when Folder redirection has been enabled via Group Policy. When folder redirection file server is co-located with Terminal server, an attacker who successfully exploited the vulnerability would be able to begin redirecting another user's personal data to a created folder.</p> <p>To exploit the vulnerability, an attacker can create a new folder under the Folder Redirection root path and create a junction on a newly created User folder. When the new user logs in, Folder Redirection would start redirecting to the folder and copying personal data.</p> <p>This elevation of privilege vulnerability can only be addressed by reconfiguring Folder Redirection with Offline files and restricting permissions, and NOT via a security update for affected Windows Servers. See the <strong>FAQ</strong> section of this CVE for configuration guidance.</p>

CVSS3: 7.8
0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2021-26887

Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability

CVSS3: 7.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-xphp-jrmh-9rjj

Microsoft Windows Folder Redirection Elevation of Privilege Vulnerability

CVSS3: 7.8
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2021-01677

Уязвимость реализации технологии перенаправления папок Folder Redirection операционных систем Windows, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу