<p>An elevation of privilege vulnerability exists in Microsoft Windows when Folder redirection has been enabled via Group Policy. When folder redirection file server is co-located with Terminal server, an attacker who successfully exploited the vulnerability would be able to begin redirecting another user's personal data to a created folder.</p>
<p>To exploit the vulnerability, an attacker can create a new folder under the Folder Redirection root path and create a junction on a newly created User folder. When the new user logs in, Folder Redirection would start redirecting to the folder and copying personal data.</p>
<p>This elevation of privilege vulnerability can only be addressed by reconfiguring Folder Redirection with Offline files and restricting permissions, and NOT via a security update for affected Windows Servers. See the <strong>FAQ</strong> section of this CVE for configuration guidance.</p>
Metrics
Affected Vendors & Products
References
History
Tue, 19 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: microsoft
Published: 2021-03-11T15:42:16
Updated: 2024-11-19T16:07:28.981Z
Reserved: 2021-02-08T00:00:00
Link: CVE-2021-26887
Vulnrichment
Updated: 2024-08-03T20:33:41.285Z
NVD
Status : Modified
Published: 2021-03-11T16:15:15.800
Modified: 2023-12-29T20:15:55.393
Link: CVE-2021-26887
Redhat
No data.