Deploying Files via Group Policies or How Group Policy Updates Can Ruin Your Day

20. October 2022

During a workstation assessment at the beginning of 2021, usd HeroLab analysts identified a trivial privilege escalation vulnerability occurring during Group Policy Updates. The vulnerability itself was not exploitable by default, but relied on a misconfiguration. However, this type of misconfiguration seemed to occur in other environments as well, so they informed Microsoft about the issue.

With their LabNews blog post, they want to raise awareness of this problem and help other security analysts and system administrators to recognize and fix it.

Continue to blog post

Also interesting:

DEF CON | Las Vegas | 10. - 13. August 2023

DEF CON | Las Vegas | 10. - 13. August 2023

DEF CON is the longest running and largest underground hacking conference in the world. It is known for its in-depth focus on computer security and hacking and provides a platform for some of the greatest minds in the field to share their knowledge and work together...

EU AI Act: The 7 Most Important Questions

EU AI Act: The 7 Most Important Questions

The EU AI Act establishes the world's first comprehensive legal framework for artificial intelligence. What was previously considered a technological playground is now becoming a regulated responsibility. Artificial intelligence (AI) can no longer operate without...

DORA Requirements Become More Concrete: Further RTS and ITS Published

DORA Requirements Become More Concrete: Further RTS and ITS Published

Original publication date: July 30, 2024. Since this blog post was published, the final versions of the RTS and ITS have been released. You can find a concise overview here: Digital Operational Resilience Act (DORA) - EIOPA. The Digital Operational Resilience Act...

Categories

Categories