Deploying Files via Group Policies or How Group Policy Updates Can Ruin Your Day

20. October 2022

During a workstation assessment at the beginning of 2021, usd HeroLab analysts identified a trivial privilege escalation vulnerability occurring during Group Policy Updates. The vulnerability itself was not exploitable by default, but relied on a misconfiguration. However, this type of misconfiguration seemed to occur in other environments as well, so they informed Microsoft about the issue.

With their LabNews blog post, they want to raise awareness of this problem and help other security analysts and system administrators to recognize and fix it.

Continue to blog post

Also interesting:

DEF CON | Las Vegas | 10. - 13. August 2023

DEF CON | Las Vegas | 10. - 13. August 2023

DEF CON is the longest running and largest underground hacking conference in the world. It is known for its in-depth focus on computer security and hacking and provides a platform for some of the greatest minds in the field to share their knowledge and work together...

DORA Countdown: One Month Left Until the Deadline

DORA Countdown: One Month Left Until the Deadline

DORA, the Digital Operational Resilience Act, will fully apply as of 17 January 2025. We have summarized everything you need to know about the EU regulation, preparation and best practices from our news blog.

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

PCI DSS v4.0: In March 2024, version 4.0 of the Payment Card Industry Data Security Standard became mandatory after a two-year transition phase. Just a few months later, version 4.0.1 was released as a minor update of the standard, which will become mandatory on...

Top 3 Vulnerabilities in SSO Pentests

Top 3 Vulnerabilities in SSO Pentests

During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to corporate security. They increasingly encounter the same vulnerabilities. Our blog series "Top 3 Vulnerabilities" presents...

Categories

Categories