Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
The product utilizes multiple threads or processes to allow temporary access to a shared resource that can only be exclusive to one process at a time, but it does not properly synchronize these actions, which might cause simultaneous accesses of this resource by multiple threads or processes.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_10_1507 | Microsoft | * | 10.0.10240.19869 (excluding) |
Windows_10_1607 | Microsoft | * | 10.0.14393.5850 (excluding) |
Windows_10_1809 | Microsoft | * | 10.0.17763.4252 (excluding) |
Windows_10_20h2 | Microsoft | * | 10.0.19042.2846 (excluding) |
Windows_10_21h2 | Microsoft | * | 10.0.19044.2846 (excluding) |
Windows_10_22h2 | Microsoft | * | 10.0.19045.2846 (excluding) |
Windows_11_21h2 | Microsoft | * | 10.0.22000.1817 (excluding) |
Windows_11_22h2 | Microsoft | * | 10.0.22621.1555 (excluding) |
Windows_server_2008 | Microsoft | –sp2 (including) | –sp2 (including) |
Windows_server_2008 | Microsoft | r2-sp1 (including) | r2-sp1 (including) |
Windows_server_2012 | Microsoft | - (including) | - (including) |
Windows_server_2012 | Microsoft | r2 (including) | r2 (including) |
Windows_server_2016 | Microsoft | - (including) | - (including) |
Windows_server_2019 | Microsoft | - (including) | - (including) |
Windows_server_2022 | Microsoft | - (including) | - (including) |
Synchronization refers to a variety of behaviors and mechanisms that allow two or more independently-operating processes or threads to ensure that they operate on shared resources in predictable ways that do not interfere with each other. Some shared resource operations cannot be executed atomically; that is, multiple steps must be guaranteed to execute sequentially, without any interference by other processes. Synchronization mechanisms vary widely, but they may include locking, mutexes, and semaphores. When a multi-step operation on a shared resource cannot be guaranteed to execute independent of interference, then the resulting behavior can be unpredictable. Improper synchronization could lead to data or memory corruption, denial of service, etc.