![]()
Server admins and security-heads take note: there’s a new Windows zero-day that’s like leaving the key in the lock. It just requires access to any standard user account, and provides administrative privileges with the execution of a single application. There’s pretty much no defense against it as it stands, so keep anyone you don’t trust implicitly
Source: Hot Hardware – Pesky Zero-Day Exploit Grants Admin Access To Any Windows User, Evades Microsoft Security Patch