<p>An elevation of privilege vulnerability exists in Microsoft Windows when Folder redirection has been enabled via Group Policy. When folder redirection file server is co-located with Terminal server, an attacker who successfully exploited the vulnerability would be able to begin redirecting another user's personal data to a created folder.</p> <p>To exploit the vulnerability, an attacker can create a new folder under the Folder Redirection root path and create a junction on a newly created User folder. When the new user logs in, Folder Redirection would start redirecting to the folder and copying personal data.</p> <p>This elevation of privilege vulnerability can only be addressed by reconfiguring Folder Redirection with Offline files and restricting permissions, and NOT via a security update for affected Windows Servers. See the <strong>FAQ</strong> section of this CVE for configuration guidance.</p>
History

Tue, 19 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published: 2021-03-11T15:42:16

Updated: 2024-11-19T16:07:28.981Z

Reserved: 2021-02-08T00:00:00

Link: CVE-2021-26887

cve-icon Vulnrichment

Updated: 2024-08-03T20:33:41.285Z

cve-icon NVD

Status : Modified

Published: 2021-03-11T16:15:15.800

Modified: 2023-12-29T20:15:55.393

Link: CVE-2021-26887

cve-icon Redhat

No data.