First published: Tue Nov 16 2021(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability. The specific flaw exists within Windows Update Assistant. By creating a symbolic link, an attacker can abuse the Update Assistant to delete a folder. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 Update Assistant | ||
Microsoft Windows | ||
Microsoft Windows Update Assistant | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42297 is a vulnerability that allows local attackers to escalate privileges on affected installations of Microsoft Windows.
CVE-2021-42297 works by exploiting a flaw within the Windows Update Assistant, where an attacker can create a symbolic link to abuse the Update Assistant.
CVE-2021-42297 has a severity rating of 7.8, indicating it is a high-severity vulnerability.
To fix CVE-2021-42297, users should apply the necessary patches and updates provided by Microsoft.
More information about CVE-2021-42297 can be found on the Microsoft Security Response Center website and the Zero Day Initiative website.