Deploying Files via Group Policies or How Group Policy Updates Can Ruin Your Day

20. October 2022

During a workstation assessment at the beginning of 2021, usd HeroLab analysts identified a trivial privilege escalation vulnerability occurring during Group Policy Updates. The vulnerability itself was not exploitable by default, but relied on a misconfiguration. However, this type of misconfiguration seemed to occur in other environments as well, so they informed Microsoft about the issue.

With their LabNews blog post, they want to raise awareness of this problem and help other security analysts and system administrators to recognize and fix it.

Continue to blog post

Also interesting:

DEF CON | Las Vegas | 10. - 13. August 2023

DEF CON | Las Vegas | 10. - 13. August 2023

DEF CON is the longest running and largest underground hacking conference in the world. It is known for its in-depth focus on computer security and hacking and provides a platform for some of the greatest minds in the field to share their knowledge and work together...

Security Advisories on OrangeHRM und memos

Security Advisories on OrangeHRM und memos

The pentest professionals at usd HeroLab identified multiple vulnerabilities in the applications OrangeHRM and memos during web application pentests. The vulnerabilities were reported to the vendors as part of the Responsible Disclosure Policy. Detailed information on...

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

Since the publication of the original blog post in May 2024, the final version of the RTS for TLPT has been released. The blog post has been updated accordingly and now covers the current requirements. The Digital Operational Resilience Act (DORA) came into force on...

Categories

Categories