CVE-2021-36934

HIGH KEV LAB

Windows - Privilege Escalation

Title source: llm

Description

<p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker must have the ability to execute code on a victim system to exploit this vulnerability.</p> <p>After installing this security update, you <em>must</em> manually delete all shadow copies of system files, including the SAM database, to fully mitigate this vulnerabilty. <strong>Simply installing this security update will not fully mitigate this vulnerability.</strong> See <a href="https://support.microsoft.com/topic/1ceaa637-aaa3-4b58-a48b-baf72a2fa9e7">KB5005357- Delete Volume Shadow Copies</a>.</p>

Exploits (29)

nomisec WORKING POC 213 stars
by HuskyHacks · local
https://github.com/HuskyHacks/ShadowSteal
nomisec WORKING POC 35 stars
by WiredPulse · local
https://github.com/WiredPulse/Invoke-HiveNightmare
nomisec WORKING POC 10 stars
by JoranSlingerland · poc
https://github.com/JoranSlingerland/CVE-2021-36934
nomisec WORKING POC 9 stars
by romarroca · poc
https://github.com/romarroca/SeriousSam
nomisec WORKING POC 8 stars
by Wh04m1001 · local
https://github.com/Wh04m1001/VSSCopy
nomisec STUB 7 stars
by exploitblizzard · poc
https://github.com/exploitblizzard/CVE-2021-36934
nomisec WORKING POC 5 stars
by Sp00kySkelet0n · poc
https://github.com/Sp00kySkelet0n/PyNightmare
nomisec WORKING POC 5 stars
by n3tsurge · local
https://github.com/n3tsurge/CVE-2021-36934
nomisec WORKING POC 3 stars
by chron1k · local
https://github.com/chron1k/oxide_hive
nomisec WORKING POC 3 stars
by Preventions · local
https://github.com/Preventions/CVE-2021-36934
nomisec WORKING POC 2 stars
by websecnl · local
https://github.com/websecnl/CVE-2021-36934
nomisec WORKING POC 2 stars
by grishinpv · local
https://github.com/grishinpv/poc_CVE-2021-36934
nomisec SCANNER 2 stars
by VertigoRay · local
https://github.com/VertigoRay/CVE-2021-36934
nomisec WORKING POC 1 stars
by OlivierLaflamme · poc
https://github.com/OlivierLaflamme/CVE-2021-36934-export-shadow-volume-POC
nomisec WORKING POC 1 stars
by irissentinel · local
https://github.com/irissentinel/CVE-2021-36934
nomisec WORKING POC 1 stars
by tda90 · local
https://github.com/tda90/CVE-2021-36934
nomisec WORKING POC 1 stars
by 0x0D1n · local
https://github.com/0x0D1n/CVE-2021-36934
nomisec SCANNER 1 stars
by bytesizedalex · local
https://github.com/bytesizedalex/CVE-2021-36934
nomisec WORKING POC 1 stars
by WiredPulse · poc
https://github.com/WiredPulse/Invoke-HiveDreams
nomisec WRITEUP
by d4yon · poc
https://github.com/d4yon/CVE-2021-36934-HiveNightmare-Lab
nomisec WORKING POC
by P1rat3R00t · local
https://github.com/P1rat3R00t/Why-so-Serious-SAM
nomisec WRITEUP
by shaktavist · poc
https://github.com/shaktavist/SeriousSam
nomisec WORKING POC
by jmaddington · local
https://github.com/jmaddington/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM
patchapalooza WORKING POC
by OlivierLaflamme · local
https://github.com/OlivierLaflamme/CVE-2021-36934_export_shadow_volume
patchapalooza WORKING POC
by CrackerCat · local
https://github.com/CrackerCat/HiveNightmare
patchapalooza WORKING POC
by Sp00p64 · local
https://github.com/Sp00p64/PyNightmare
patchapalooza WORKING POC
by gvillegas · local
https://gitlab.com/gvillegas/vsssam
patchapalooza WORKING POC
by GossiTheDog · local
https://github.com/GossiTheDog/HiveNightmare
patchapalooza WRITEUP
by Ascotbe · local
https://github.com/Ascotbe/Kernelhub

Scores

CVSS v3 7.8
EPSS 0.9055
EPSS Percentile 99.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-02-10
VulnCheck KEV 2022-02-09
InTheWild.io 2021-07-26
ENISA EUVD EUVD-2021-23510
Status published
Products (5)
microsoft/windows_10_1809 < 10.0.17763.2114
microsoft/windows_10_1909 < 10.0.18363.1734
microsoft/windows_10_2004 < 10.0.19041.1165
microsoft/windows_10_20h2 < 10.0.19042.1165
microsoft/windows_10_21h1 < 10.0.19043.1165
Published Jul 22, 2021
KEV Added Feb 10, 2022
Tracked Since Feb 18, 2026