virus logo Client Application Firewall

MS.Active.Directory.SAM.Privilege.Escalation

description-logoDescription

This indicates a possible attack against a Privilege Escalation vulnerability in Microsoft Active Directory.
The vulnerability is due to insufficient sanitizing of user supplied inputs. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application via a crafted request.

description-logoOutbreak Alert

On November 9, Microsoft released a patch for several zero-day vulnerabilities related to Active Directory privilege escalation, 2 of which are of particular interest as they can lead to Windows Domain takeover when chained together.

View the full Outbreak Alert Report

affected-products-logoAffected Products

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server, version 20H2 (Server Core Installation)
Windows Server, version 2004 (Server Core installation)

Impact logoImpact

Privilege Escalation: Remote attackers can leverage their privilege on the vulnerable systems.

recomended-action-logoRecommended Actions

Refer to the vendor's website for a suggested workaround.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42278

Version Updates

Date Version Detail
2022-03-31 20.289 Sig Added
2022-02-23 19.264 Sig Added
2022-02-22 19.263 Sig Added