CCE-38539-3Platform: cpe:/o:microsoft:windows_server_2012::r2 | Date: (C)2022-08-18 (M)2023-07-04 |
This subcategory reports when a user account or service uses a sensitive privilege. A sensitive privilege includes the following user rights: Act as part of the operating system, Back up files and directories, Create a token object, Debug programs, Enable computer and user accounts to be trusted for delegation, Generate security audits, Impersonate a client after authentication, Load and unload device drivers, Manage auditing and security log, Modify firmware environment values, Replace a process-level token, Restore files and directories, and Take ownership of files or other objects. Auditing this subcategory will create a high volume of events.
Events for this subcategory include:
4672: Special privileges assigned to new logon.
4673: A privileged service was called.
4674: An operation was attempted on a privileged object.
The recommended state for this setting is: Success and Failure.
Parameter:
[success/failure/success_failure/none]
Technical Mechanism:
(1) GPO: Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Privilege Use!Audit Policy: Privilege Use: Sensitive Privilege Use
(2) REG: NO REGISTRY INFO
CCSS Severity: | CCSS Metrics: |
CCSS Score : 6.5 | Attack Vector: LOCAL |
Exploit Score: 0.6 | Attack Complexity: LOW |
Impact Score: 5.9 | Privileges Required: HIGH |
Severity: MEDIUM | User Interaction: REQUIRED |
Vector: AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H | Scope: UNCHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:82153 |