
Cloud Vulnerability DB
A community-led vulnerabilities database
A Windows Lock Screen authentication bypass vulnerability, identified as CVE-2021-26431, was discovered and reported on June 30, 2021. This security flaw affects Microsoft Windows installations and specifically involves the lock screen functionality. The vulnerability was publicly disclosed on September 2, 2021, after Microsoft issued an update to address the issue (ZDI Advisory).
The vulnerability stems from improper access control within the Windows lock screen mechanism. The specific flaw exists due to the lack of proper access control prior to authentication. The vulnerability has been assigned a CVSS score of 6.8 (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating a moderate to high severity level (ZDI Advisory).
If successfully exploited, this vulnerability allows physically present attackers to bypass authentication on affected Windows systems. An attacker can leverage this vulnerability to gain unauthorized access to the system, potentially compromising the confidentiality, integrity, and availability of the affected system (ZDI Advisory).
Microsoft has released a security update to address this vulnerability. Users are advised to apply the available patches through the Microsoft update mechanism (ZDI Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."