Skip to main content

Hi all,

a new 0Day vulnerability for Windows 10 clients has been released, the article also recommends deleting all the vss restore points and recreating them

Security Update Guide - Loading - Microsoft

Check Windows 10 for SeriousSAM and HiveNightmare Vulnerability Fix - Virtualization Howto

https://github.com/GossiTheDog/HiveNightmare

commad check : icacls c:\windows\system32\config\sam

Workarounds

Restrict access to the contents of %windir%\system32\config

Command Prompt (Run as administrator): icacls %windir%\system32\config\*.* /inheritance:e

Windows PowerShell (Run as administrator): icacls $env:windir\system32\config\*.* /inheritance:e

Delete Volume Shadow Copy Service (VSS) shadow copies

  1. Delete any System Restore points and Shadow volumes that existed prior to restricting access to %windir%\system32\config.
  2. Create a new System Restore point (if desired).

Impact of workaround Deleting shadow copies could impact restore operations, including the ability to restore data with third-party backup applications. For more information on how to delete shadow copies, see KB5005357- Delete Volume Shadow Copies.

Note You must restrict access and delete shadow copies to prevent exploitation of this vulnerability.

KB5005357- Eliminare copie shadow del volume (microsoft.com)

To mitigate this type of bug it is possible to use a GPO to distribute the workaround on the whole in Forest \ Domain

 

I have a guide that will help elucify and mitigate this issue: https://techdirectarchive.com/2021/07/22/sam-database-vulnerability-microsoft-provides-workaround-for-serioussam-or-hivenightmare-registry-vulnerability-for-windows-10-and-11/ 


Great posts and thanks for sharing.


@Link State : Thanks for informing and sharing !


Comment