Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
SEVERITY: High
CATEGORY: Vulnerability
ANALYSIS SUMMARY
Microsoft Exchange could allow a local authenticated attacker to gain elevated privileges on the system, caused by default high privileges in the Active Directory domain. By using an API call, an attacker could exploit this vulnerability to become a Domain Admin and gain elevated privileges on the system. The Exchange Windows Permissions group has WriteDacl access on the domain object in active directory, which enables any member of this group to modify the domain privileges, among which is the privilege to perform DCSync operations.
IMPACT
Privilege Escalation
AFFECTED PRODUCTS
REMEDIATION
Vendor has not released any of the updates for the following vulnerability.