Lock screen/Bitlocker bypass/elevation of privilege in Bitlockerhttps://docs.google.com/document/d/1S4jU7knBG_Km_AdHXf8JyE8zl0SOxQ9VvYFPanQy1g8/edit?usp=sharing …
-
-
Replying to @jonasLyk
Interesting finds Jonas, and a good writeup. Were these issues among those rejected for bounty?
1 reply 0 retweets 0 likes -
Replying to @mkolsek
no for the bitlocker stuff there have been 0 problems- rumors say it was big conversation topic in ms sec cafeteria. it is the first login screen bypass since win98 so.... guess nobody else is retarded enough to do such random stuff :)
1 reply 0 retweets 8 likes -
-
Replying to @mkolsek
Bitlocker do, the group policy ms claims is the same vuln as this: https://securityboulevard.com/2020/06/group-policies-going-rogue/ … Because they fixed it by moving %USERPROFILE%/ntuser.pol and C:\Users\user\AppData\Local\Microsoft\Group Policy\History\ to another path- even though ntuser.pol is 100% irrevant for the oth
2 replies 1 retweet 4 likes -
#CVE-2020-1317 seems to have been the "big" collector for all GP policies issues. I found a couple of other vulns in GP processing which also fall into CVE-2020-13171 reply 0 retweets 2 likes
WTF- change enough and all vulns stop working, why not just replace diagnostrig tracking service exe with windows error reporting service exe? All vulns fixed! How many WTF ids do you need assigned?
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.