How Microsoft Windows 10, 11 Serious SAM Vulnerability can be Mitigated?

SAM Vulnerability
Share It On:

28th July 2021, Kathmandu

Microsoft Windows 10 and Windows 11 users are at risk of new unpatched vulnerabilities that have recently been publicly disclosed.

As we reported last week, the vulnerability SeriousSAM allows attackers with low-level permissions to access Windows system files to perform PasstheHash (and possibly Silver Ticket) attacks.

An attacker can use this vulnerability to obtain hashed passwords stored in the Security Account Manager (SAM) and the registry, and eventually, run arbitrary code with SYSTEM privileges. The

Serious sam vulnerability (numbered CVE202136934) exists in the default configuration of Windows 10 and Windows 11, especially because the setting allows “read” access to the built-in user group that contains all local users.

Therefore, local built-in users can access and read the SAM file and registry, and they can also view the hash value in it. Once an attacker has “user” access, they can use tools like Mimikatz to access the registry or SAM, steal the hash value, and convert it to a password. Invading domain users in this way will allow the attacker to gain greater authority on the network.

Since Microsoft has not yet provided an official patch, the best way to protect your environment from the SeriousSAM vulnerability is to implement hardening measures.

 According to CalCom CTO Dvir Goren, there are three optional enforcement measures:

Remove all users from the built-in user pool – This is a good starting point, but you will not be protected if your administrator credentials are stolen.

Restrict SAM files and registry permissions that only administrators can access. Again, this can only solve part of the problem; just as an attacker stole the administrator credentials, you are still vulnerable to this vulnerability.

Storage of passwords and credentials for network authentication is not allowed; this rule is also recommended in CIS benchmarks. No hashes will be stored in the SAM or registry by implementing this rule, thus fully mitigating this vulnerability.

When using GPO for deployment, make sure to enable the following UI paths:


Share It On:

Recent Posts

AI in Telecom: Nepal Telecom Debuts Service Robot ‘Maina’

AI in Telecom: Nepal Telecom Debuts Service Robot ‘Maina’

Share It On:17th November 2024, Kathmandu Nepal Telecom has taken a significant step forward in customer service innovation by launching

Lumbini Lions Jersey Unveiled: A Tribute to Buddhist Heritage

Lumbini Lions Jersey Unveiled: A Tribute to Buddhist Heritage

Share It On:17th November 2024, Kathmandu The Lumbini Lions Club has unveiled their jersey for the upcoming Nepal Premier League

Barbadian Fast Bowler Ramon Simmonds Joins Lumbini Lions for NPL 2024

Barbadian Fast Bowler Ramon Simmonds Joins Lumbini Lions for NPL

Share It On:17th November 2024, Kathmandu Lumbini Lions have added firepower to their bowling attack for the upcoming Nepal Premier

Xiaomi Unveils New High-Capacity Fast-Charging Power Banks in Nepal

Xiaomi Unveils New High-Capacity Fast-Charging Power Banks in Nepal

Share It On:17th November 2024, Kathmandu Xiaomi, a global leader in consumer electronics and smart manufacturing, has unveiled three new

.NET Conf 2024 AspnetCommunity Kathmandu Nepal Successfully Concludes With 130+ Attendees

.NET Conf 2024 AspnetCommunity Kathmandu Nepal Successfully Concludes With 130+

Share It On:17th November 2024, Kathmandu The ASP.NET Community has successfully hosted “.NET Conf 2024 AspnetCommunity Kathmandu Nepal” at Kantipur

Gen AI in Focus 2024: November Breakthroughs, Industry Stats & Election Impact

Gen AI in Focus 2024: November Breakthroughs, Industry Stats &

Share It On:17th November 2024, Kathmandu Generative AI is revolutionizing industries, with the market expected to surge from $40 billion