Uncategorized

SeriousSAM (Windows 10&11 Vulnerability) Mitigation Walkthrough

Reading time: 3 Minutes Read
Ben Balkin
Published on: July 22, 2021
SeriousSAM (Windows 10&11 Vulnerability) Mitigation Walkthrough

A new vulnerability in Windows 10 and Windows 11 was discovered a few days ago. The vulnerability – SeriousSAM , allows attackers with user account access to perform a Pass-the-Hash (and potentially Silver Ticket) attack. By leveraging this vulnerability, attackers can access hashed passwords that are stored in the Security Account Manager (SAM) and the Registry.

This post will cover:

  1. SeriousSAM vulnerability.
  2. How to mitigate SeriousSAM.
  3. Mitigate without causing damage to production.

SeriousSAM vulnerability:

The vulnerability sources in a default configuration set by Microsoft in Windows 10 and 11. This setting allocates ‘read’ permissions to the built-in user’s group that contains all local users.

As a result, all built-in local users have permission to read both the SAM files and the Registry and can access the hashes stored in them. An attacker gaining ‘User’ access can use a tool such as Mimikatz to enter the Registry or the SAM, steal the hashes and convert them to passwords. By using it to intrude Domain users, attackers can access the network with elevated privileges.

Your best option for mitigating SeriousSAM vulnerability is to implement hardening actions.

Mitigating SeriousSAM:

Dvir Goren, CTO at CalCom, offers 3 optional hardening actions for mitigation:

  1. Delete all the users from the built-in users’ group – this is a good place to start from, but won’t protect you in case that Administrator credentials will be stolen.
  2. Restrict SAM files and Registry permissions – allow access only for Administrators. This will, again, solve only part of the problem since if an attacker will steal Admin credentials, you’ll be exposed to this vulnerability.
  3. Do not allow storage of passwords and credentials for network authentication – this rule is also recommended by the CIS in their benchmarks. By implementing this rule, no hash will be stored in the SAM or in the Registry, therefore it is complete mitigation of this vulnerability.
    When using GPOs for implementation, make sure that the following UI Path is Enabled:
    Computer ConfigurationPoliciesWindows SettingsSecurity SettingsLocal PoliciesSecurity OptionsNetwork access: Do not allow storage of passwords and credentials for network authentication

CIS Hardening and Configuration Security Guide

Note! Although the last recommendation offers the best solution for the SeriousSAM vulnerability, it may affect your production. You must test this policy’s impact on your production before pushing it!

Applications using scheduled tasks and applications that need to store locally users’ hash will fail if this setting is enabled.

Mitigating SeriousSAM without risking causing damage to production

The following are Dvir’s recommendations for mitigating without causing downtime:

  1. Build a test environment that will simulate your production. Try to be as accurate as possible, to simulate all possible dependencies you have in your network.
  2. Perform an impact analysis of this rule on your test environment. This way, if you have applications depending on hashes being stored locally, you’ll know in advance and prevent production downtime.
  3. Push the policy where possible. Make sure new machines are also hardened and that no configuration drifts occur over time.
  4. These three tasks are complex and require in-house expertise and a lot of resources. Therefore, Dvir’s final recommendation is to automate the entire hardening process to save the need to perform stages 1,2, and 3.

    This is why you should consider using a Hardening Automation Tool:

    1. Automatically generate the most accurate possible impact analysis report – hardening automation tools ‘learns’ your production dependencies and report to you the potential impact of each policy rule.

    2. Automatically enforce your policy on your entire production from a single point of control – using these tools, you won’t need to do manual work, such as using GPOs. You can control and be certain all your machines are hardened.

    3. Maintain your compliance posture and monitor your machines in real-time – hardening automation tools will monitor your compliance posture, alert, and remediate any unauthorized changes in configurations, therefore preventing configuration drifts.

Ben Balkin
Ben Balkin is a professional writer and blogger specializing in technology and innovation. As a contributor to the Calcom blog, Ben shares practical insights, useful tips, and engaging articles designed to simplify complex processes and make advanced technological solutions accessible to everyone. His writing style is clear, insightful, and inspiring, reflecting his strong belief in technology's power to enhance quality of life and empower businesses.

Related Articles

About Us

Established in 2001, CalCom is the leading provider of server hardening solutions that help organizations address the rapidly changing security landscape, threats, and regulations. CalCom Hardening Suite (CHS) is a security baseline hardening solution that eliminates outages, reduces operational costs, and ensures a resilient, constantly hardened, and monitored server environment.

More about us
Background Shape
About Us

Stay Ahead with Our Newsletter

Get the latest insights, security tips, and exclusive resources straight to your inbox every month.

    Ready to simplify compliance?

    See automated compliance in action—book your demo today!