CVE-2021-36942

7.5 HIGH

📋 TL;DR

CVE-2021-36942 is a Local Security Authority (LSA) spoofing vulnerability in Windows that allows an authenticated attacker to impersonate any user on a system, including administrators. This affects Windows 10, Windows 11, and Windows Server systems. Attackers can exploit this to elevate privileges and potentially gain full system control.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2019
  • Windows Server 2022
Versions: Windows 10 versions 1809 and later, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have valid user credentials and local access to the target system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, enabling lateral movement, data theft, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Privilege escalation from standard user to SYSTEM/administrator level, allowing installation of malware, credential harvesting, and bypassing security controls.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege enforcement, and endpoint detection/prevention systems blocking suspicious LSA calls.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: HIGH with brief explanation

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available and has been observed in real-world attacks. Requires authenticated access to the target system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: August 2021 security updates (KB5005033 for Windows 10 21H1, KB5005031 for Windows 10 20H2, etc.)

Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36942

Restart Required: Yes

Instructions:

1. Apply August 2021 Windows security updates via Windows Update. 2. For enterprise environments, deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Restrict NTLM authentication

windows

Configure Group Policy to restrict NTLM authentication which may reduce attack surface

gpedit.msc -> Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> Network security: Restrict NTLM: Incoming NTLM traffic

Enable Windows Defender Credential Guard

windows

Protects against credential theft attacks that could be combined with this vulnerability

Enable via Group Policy: Computer Configuration -> Administrative Templates -> System -> Device Guard -> Turn On Virtualization Based Security

🧯 If You Can't Patch

  • Implement strict network segmentation to limit lateral movement from compromised systems
  • Enforce least privilege access controls and monitor for unusual LSA process activity

🔍 How to Verify

Check if Vulnerable:

Check Windows version and compare with patched versions. Systems running Windows 10 1809+ or Windows 11 without August 2021 updates are vulnerable.

Check Version:

winver or systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history contains August 2021 security updates (KB5005033 or similar) or check system version is post-patch.

📡 Detection & Monitoring

Log Indicators:

  • Unusual LSA process creation events (Event ID 4688)
  • Suspicious authentication attempts in Security logs
  • Unexpected privilege escalation events

Network Indicators:

  • Unusual NTLM authentication patterns
  • Lateral movement attempts from previously compromised systems

SIEM Query:

EventID=4688 AND (ProcessName="lsass.exe" OR CommandLine CONTAINS "lsass") AND NewProcessName NOT IN (expected_processes)

🔗 References

📤 Share & Export