Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

How to Address the SeriousSAM Vulnerability in Microsoft Windows 10 and 11

On July 26, 2021, a critical unpatched vulnerability affecting Microsoft Windows 10 and 11 was publicly disclosed. Known as SeriousSAM, this vulnerability enables attackers with low-level permissions to access sensitive system files, potentially leading to Pass-the-Hash and Silver Ticket attacks. Exploiting this flaw can allow attackers to access hashed passwords within the Security Account Manager (SAM) and the Registry, ultimately enabling them to execute arbitrary code with SYSTEM privileges.

The SeriousSAM vulnerability, identified as CVE-2021-36934, is present in the default settings of Windows 10 and 11 due to a configuration that grants ‘read’ permissions to the built-in users group, which includes all local users. Consequently, these users can access SAM files and the Registry, allowing them to view password hashes. With ‘User’ access, attackers can utilize tools like Mimikatz to further exploit the system.

  • adminadmin
  • April 15, 2026
  • vulnerabilities

Security Alert: Exposure of SeriousSAM Vulnerability in Windows 10 and 11

July 26, 2021

A newly disclosed vulnerability, dubbed SeriousSAM, poses significant risks to users of Microsoft Windows 10 and Windows 11. This unpatched flaw enables attackers with minimal privileges to gain access to critical Windows system files, potentially leading to attacks such as Pass-the-Hash and Silver Ticket exploitation. By leveraging this vulnerability, malicious actors could retrieve hashed passwords stored within the Security Account Manager (SAM) and the Windows Registry, ultimately acquiring the capacity to execute arbitrary code with elevated SYSTEM privileges.

The vulnerability, identified as CVE-2021-36934, arises from default configurations in Windows 10 and 11. Specifically, a setting that permits ‘read’ access to the built-in user group—which encompasses all local users—facilitates this exploitation. As a result, individuals with basic access rights can read SAM files and the associated Registry, exposing sensitive password hashes. When an attacker achieves ‘User’ access, they can employ tools like Mimikatz to extract these hashes and escalate their privileges within the system.

The implications of this vulnerability extend to businesses and organizations reliant on these operating systems. With local user accounts having unwarranted access to critical security components, organizations must evaluate their security posture to mitigate potential risks.

This vulnerability is most relevant to companies located in the United States, where Windows 10 and 11 are popular operating systems among businesses of all sizes. The attack vector is particularly concerning as it allows unauthorized access to critical systems, making it imperative for business owners to implement immediate protective measures.

According to the MITRE ATT&CK framework, the tactics and techniques associated with this vulnerability can be categorized under initial access, privilege escalation, and credential access. Attackers may initially exploit the accessible system files to gain foothold, subsequently escalating privileges through the harvested credentials to execute further malicious activities within targeted environments.

To counteract the SeriousSAM vulnerability, businesses should consider revising user permission settings and conducting thorough audits of system configurations. Implementing robust access controls and regularly updating systems can significantly reduce exposure to such critical vulnerabilities.

In summary, the SeriousSAM vulnerability presents a notable threat to users of Windows 10 and 11 systems. By understanding the nature of this exploit and adopting comprehensive security measures, organizations can better protect sensitive information and maintain the integrity of their digital infrastructure.

Source link

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Android Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T AWS CISA Cisco Cloudflare cloud security compliance CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security encryption ESET Facebook FBI Fraud Management GitHub Google healthcare HIPAA Kaspersky machine learning Malware Mandiant Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Salesforce Telegram Trend Micro Windows

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

Apple Issues Critical 0-Day Patch for Mac, iPhone, and iPad

On July 27, 2021, Apple released a crucial security update for iOS, iPadOS, and macOS to fix a zero-day vulnerability that may have already been exploited. This marks the thirteenth such vulnerability Apple has addressed this year. The update, which follows the recent launch of iOS 14.7, iPadOS 14.7, and macOS Big Sur 11.5, resolves a memory corruption issue (CVE-2021-30807) in the IOMobileFrameBuffer, a kernel extension responsible for managing the screen framebuffer. This flaw could allow malicious actors to execute arbitrary code with kernel privileges. Apple stated that it has improved memory handling to mitigate this risk and acknowledged reports of potential exploitation. As is standard, specific details about the vulnerability have not been released to prevent further attacks. An anonymous researcher is credited with discovering and reporting the issue.

  • April 15, 2026

Security Flaws Discovered in Three Widely Used Open-Source Software Solutions

On July 27, 2021, cybersecurity researchers revealed nine vulnerabilities across three popular open-source projects—EspoCRM, Pimcore, and Akaunting. These platforms are commonly utilized by small to medium businesses, and successful exploitation of these flaws could lead to more advanced cyberattacks. The identified vulnerabilities affect EspoCRM v6.1.6, Pimcore Customer Data Framework v3.0.0, Pimcore AdminBundle v6.8.0, and Akaunting v2.1.12. Fortunately, all issues were addressed within a day of being disclosed, according to researchers Wiktor Sędkowski from Nokia and Trevor Christiansen from Rapid7. Notably, six of the nine vulnerabilities originated in the Akaunting project. EspoCRM serves as an open-source customer relationship management application, while Pimcore functions as an open-source enterprise platform for managing customer data, digital assets, content, and commerce. Akaunting provides open-source online accounting solutions.

  • April 15, 2026

Microsoft Alerts Users to New Unresolved Windows Print Spooler RCE Vulnerability

August 12, 2021

Following the release of its Patch Tuesday updates, Microsoft has revealed yet another remote code execution (RCE) vulnerability in the Windows Print Spooler component. The company is actively working on a fix for this issue, scheduled for an upcoming security update. Identified as CVE-2021-36958 (CVSS score: 7.3), this unaddressed vulnerability adds to the ongoing list of issues collectively referred to as PrintNightmare, which have affected the printing service in recent months. Victor Mata from FusionX, Accenture Security, credited with reporting the flaw, noted that the issue was disclosed to Microsoft back in December 2020. “A remote code execution vulnerability occurs when the Windows Print Spooler service improperly handles privileged file operations,” the company stated in its out-of-band bulletin, while reiterating the details of CVE-2021-34481. “An attacker who successfully exploits this vulnerability could execute arbitrary code with system-level privileges…

  • April 15, 2026

Unresolved Remote Hacking Vulnerability Found in Fortinet’s FortiWeb WAF

Aug 18, 2021

Recent revelations highlight a serious, unpatched security flaw in Fortinet’s web application firewall (WAF) that could enable a remote authenticated attacker to execute harmful commands on the system. According to cybersecurity firm Rapid7, an OS command injection vulnerability in FortiWeb’s management interface (versions 6.3.11 and earlier) allows this exploitation through the SAML server configuration page. This issue is linked to CVE-2021-22123, which was noted in advisory FG-IR-20-120. Rapid7 identified and reported the vulnerability in June 2021, and Fortinet plans to release a fix in late August with FortiWeb version 6.4.1. While this command injection flaw has not yet been assigned a CVE identifier, it carries a severity rating of 8.7 on the CVSS scoring system. Exploiting this vulnerability could enable authenticated users to execute arbitrary commands.

  • April 14, 2026

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: info@breachspot.com
Phone: +1 (914) 2943243

Copyright © 2026 - Breachspot, Security Breaches Spotted