{"id":30482,"date":"2022-10-20T10:40:33","date_gmt":"2022-10-20T08:40:33","guid":{"rendered":"https:\/\/www.usd.de\/?p=30482"},"modified":"2022-10-20T10:43:18","modified_gmt":"2022-10-20T08:43:18","slug":"news-deploying-files-via-group-policies-or-how-group-policy-updates-can-ruin-your-day","status":"publish","type":"post","link":"https:\/\/www.usd.de\/en\/news-deploying-files-via-group-policies-or-how-group-policy-updates-can-ruin-your-day\/","title":{"rendered":"Deploying Files via Group Policies or How Group Policy Updates Can Ruin Your Day"},"content":{"rendered":"\n<p>During a workstation assessment at the beginning of 2021, usd HeroLab analysts identified a trivial privilege escalation vulnerability occurring during <em>Group Policy Updates<\/em>. The vulnerability itself was not exploitable by default, but relied on a misconfiguration. However, this type of misconfiguration seemed to occur in other environments as well, so they informed Microsoft about the issue.<\/p>\n\n\n\n<p>With their LabNews blog post, they want to raise awareness of this problem and help other security analysts and system administrators to recognize and fix it.<\/p>\n\n\n\n<p><a href=\"https:\/\/herolab.usd.de\/en\/news-deploying-files-via-group-policies-or-how-group-policy-updates-can-ruin-your-day\/\" target=\"_blank\" rel=\"noopener\">Continue to blog post<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During a workstation assessment at the beginning of 2021, usd HeroLab analysts identified a trivial privilege escalation vulnerability occurring during Group Policy Updates. The vulnerability itself was not exploitable by default, but relied on a misconfiguration. However, this type of misconfiguration seemed to occur in other environments as well, so they informed Microsoft about the [&hellip;]<\/p>\n","protected":false},"author":91,"featured_media":9109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[],"tags":[3315,487,381],"class_list":["post-30482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-microsoft","tag-security-analysis-en","tag-security-research-en"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/30482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/91"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=30482"}],"version-history":[{"count":0,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/30482\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/9109"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=30482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/categories?post=30482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/tags?post=30482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}