Windows default setting leaves clients vulnerable

 

Chris Brook over on Threatpost.com reported that a Google Project Zero researcher has uncovered a vulnerability in all currently supported versions of the Windows client operating system that could be used to escalate privileges and in some cases, defeat sandboxing protections by forcing a system process to access a WebDAV UNC path and attack the local SMB server.

Read more about it here:

https://threatpost.com/default-setting-in-windows-7-8-1-could-allow-privilege-escalation-sandbox-escape/111809

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top