Tag
#Security Vulnerability
*How could an attacker exploit this vulnerability?* An authorized attacker could exploit this Windows COM vulnerability by sending from a user mode application specially crafted malicious COM traffic directed at the COM Server, which might lead to remote code execution.
*What privileges does the attacker gain?* An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.
*What privileges does the attacker gain?* An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.
*What privileges does the attacker gain?* An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.
*Where can I find more information about the improved authentication process added by the update for CVE-2021-42287?* See Authentication updates.
*Where can I find more information about Active Directory permissions updates?* See Active Directory permissions updates.
*Where can I find more information about Active Directory SAM Account hardening changes?* See Active Directory SAM Account hardening changes.
*What type of information could be disclosed by this vulnerability?* Exploiting this vulnerability could allow the disclosure of initialized and/or uninitialized memory in the process heap.
*What can cause this vulnerability?* The vulnerability occurs due to improper validation of cmdlet arguments. *Does the attacker need to be in an authenticated role in the Exchange Server?* Yes, the attacker must be authenticated.
*What are the vulnerable configurations of Hyper-V?* Installations of Hyper-V with GRE (Generic Routing Encapsulation) enabled.