Using Linux?
Do this: Apply the latest security updates.
Why: "The Qualys Research Team has discovered a size_t-to-int type conversion vulnerability in the Linux Kernel’s filesystem layer affecting most Linux operating systems. Any unprivileged user can gain root privileges on a vulnerable host by exploiting this vulnerability in a default configuration."
Additional Info: From Qualys: https://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/sequoia-a-local-privilege-escalation-vulnerability-in-linuxs-filesystem-layer-cve-2021-33909
Using Windows 10 or 11?
Do this: Apply the following mitigations while Microsoft works to release a security update:
Restrict access to the contents of %windir%\system32\config:
- Open Command Prompt or Windows PowerShell as an administrator.
- Run this command: icacls %windir%\system32\config\*.* /inheritance:e
- Delete any System Restore points and Shadow volumes that existed prior to restricting access to %windir%\system32\config.
- Create a new System Restore point (if desired).
Note: You must restrict access and delete shadow copies to prevent exploitation of this vulnerability.
Why: Windows 10 and Windows 11 are vulnerable to a local elevation of privilege vulnerability after discovering that users with low privileges can access sensitive Registry database files–including the Security Account Manager (SAM) file that contains hashed passwords for local accounts.
Additional Info: Details: https://www.bleepingcomputer.com/news/microsoft/new-windows-10-vulnerability-allows-anyone-to-get-admin-privileges/
MSRC: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36934
Send Us Your Comments
What did you think of this article? Send us a note to let us know what you liked, would like to see more of, or what we can do better. And don't be surprised if we reach back out with a small 'thank you' gift for your feedback.