This vulnerability allows local malicious users to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Additional user interaction is required in that an administrator must begin a version update of Windows. The specific flaw exists within Windows Update Assistant. By creating a directory junction, an attacker can abuse Windows Update Assistant to change the DACL on an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 10 1909 |
||
microsoft windows server 2016 2004 |
||
microsoft windows 10 2004 |
||
microsoft windows 10 20h2 |
||
microsoft windows 10 21h1 |
||
microsoft windows 10 21h2 |
||
microsoft windows 11 - |
||
microsoft windows server 20h2 |
||
microsoft windows server 2022 |