CVE-2021-41363: Intune Management Extension Security Feature Bypass Vulnerability

Overview

Severity
Medium (CVSS 4.2)
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C
Category
Security Feature Bypass
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2021-Oct
Released
2021-10-12
Last Updated
2021-10-14
EPSS Score
0.19% (percentile: 41.2%)

FAQ

Are there any pre-requisites for this vulnerability to be exploited in Intune Management Extension? This vulnerability only exists when Intune Management Extension is enabled as managed installer. Enabling IME as managed installer requires local administrator privileges. What should I do to protect myself from this vulnerability? No action is required. As soon as the client connects to the service, it automatically receives a message to update.

Affected Products (1)

Apps

  • Intune management extension

Acknowledgments

<a href="https://twitter.com/thewmiguy">Kim Oppalfens</a> with <a href="https://www.oscc.be">OSCC</a>

Revision History

  • 2021-10-12: Information published.
  • 2021-10-14: The following revisions have been made: 1) In the Security Updates table, Build Number and Article link have been added. 2) FAQs have been updated to provide information about what to do to be protected from this vulnerability.