CVE-2021-42278

Description from NVD

Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42282, CVE-2021-42287, CVE-2021-42291.

Information Acquisition Date:2022-09-07T14:48Z
CVSS 2.0: 6.5 MEDIUM CVSS 3.x: 8.8 HIGH

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:N/AC:L/Au:S/C:P/I:P/A:P

NVD References

 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42278
     source:MISC
     tags:Patch    Vendor Advisory    

This vulnerability may involve a PoC.

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: Windows(1 tweets)



List of frequently cited URLs

URLNum of Times Referred to
http://vulmon.com/vulnerabilitydetails?qid=CVE-2021402
https://alerts.vulmon.com/?utm_source=twitter&utm_medium=so...147
https://cvetrends.com50
http://cyberiqs.com/latestnews20
http://twinybots.ch20
https://medium.com12
http://Microsoft.Microsoft10
https://portal.msrc.microsoft.com/en-us/security-guidance9
http://Microsoft.Windows7
https://twitter.com/exploitph/status/14691571389289144324
https://www.bleepingcomputer.com/news/microsoft/microsoft-w...4
https://ift.tt/HdwWE4L3
https://exploit.ph/cve-2021-42287-cve-2021-42278-weaponisat...3
https://github.com/cube0x0/noPac3
https://4sysops.com/archives/exploiting-the-cve-2021-42278-...3
https://reconshell.com/windows-ad-privilege-escalation3
https://link.medium.com/Hv7DdR9icmb3
https://www.fortinet.com/blog/threat-research/cve-2021-4227...3
https://www.kitploit.com/2022/09/nopac-exploiting-cve-2021-...3
https://thehackernews.com/2021/12/active-directory-bugs-cou...3
https://jpwinsup.github.io/blog/2021/11/30/ActiveDirectory/...3
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2...3
https://www.ecucert.gob.ec/alertas3
https://securityonline.info/researcher-publishes-poc-for-ac...3
https://www.hackplayers.com/2021/12/explotacion-cve-2021-42...3
https://www.secureworks.com/blog/nopac-a-tale-of-two-vulner...3
https://support.microsoft.com/en-us/topic/kb5008102-active-...3
https://www.thehacker.recipes/ad/movement/kerberos/samaccou...3
https://www.hackingarticles.in/active-directory-privilege-e...3
https://techcommunity.microsoft.com/t5/security-compliance-...3

Information from Twitter

User URL Info Source Date
TodayCyberNews https://twitter.com/TodayCyberNews/status/16178699947460648... Source TodayCyberNews   1617869994746064896 2023/01/24
buaqbot https://ift.tt/PJNaeSw Source buaqbot          1628988149622775808 2023/02/24
buaqbot https://ift.tt/Y6eoIN9 Source buaqbot          1628988149622775808 2023/02/24

List of frequently cited URLs

URLNum of Times Referred to
vulmon.com402
alerts.vulmon.com147
cvetrends.com50
cyberiqs.com20
twinybots.ch20
medium.com12
Microsoft.Microsoft10
portal.msrc.microsoft.com9
Microsoft.Windows7
twitter.com4
www.bleepingcomputer.com4
ift.tt3
exploit.ph3
github.com3
4sysops.com3
reconshell.com3
link.medium.com3
www.fortinet.com3
www.kitploit.com3
thehackernews.com3
jpwinsup.github.io3
msrc.microsoft.com3
www.ecucert.gob.ec3
securityonline.info3
www.hackplayers.com3
www.secureworks.com3
support.microsoft.com3
www.thehacker.recipes3
www.hackingarticles.in3
techcommunity.microsoft.com3

Information from Twitter

User URL Info Source
TodayCyberNews twitter.com Show Tweet
buaqbot ift.tt Show Tweet
buaqbot ift.tt Show Tweet

GitHub Search Results: Up to 10
NameURL
cube0x0/noPac https://github.com/cube0x0/noPac
WazeHell/sam-the-admin https://github.com/WazeHell/sam-the-admin
Ridter/noPac https://github.com/Ridter/noPac
ly4k/Pachine https://github.com/ly4k/Pachine
XiaoliChan/Invoke-sAMSpoofing https://github.com/XiaoliChan/Invoke-sAMSpoofing
knightswd/NoPacScan https://github.com/knightswd/NoPacScan
Ascotbe/Kernelhub https://github.com/Ascotbe/Kernelhub
waterrr/noPac https://github.com/waterrr/noPac
cybersecurityworks553/noPac-detection https://github.com/cybersecurityworks553/noPac-detection
IAMinZoho/sAMAccountName-Spoofing https://github.com/IAMinZoho/sAMAccountName-Spoofing

GitHub Search Results: Up to 10
NameURL
cube0x0/noPac github.com
WazeHell/sam-the-admin github.com
Ridter/noPac github.com
ly4k/Pachine github.com
XiaoliChan/Invoke-sAMSpoofing github.com
knightswd/NoPacScan github.com
Ascotbe/Kernelhub github.com
waterrr/noPac github.com
cybersecurityworks553/noPac-detection github.com
IAMinZoho/sAMAccountName-Spoofing github.com

2023/02/24 Score : 0
Added Har-sia Database : 2021/11/10
Last Modified : 2023/02/24
Highest Scored Date : 2021/12/14
Highest Score : 49