{"id":332,"date":"2021-10-18T09:51:21","date_gmt":"2021-10-18T09:51:21","guid":{"rendered":"https:\/\/labs.redyops.com\/?p=332"},"modified":"2021-10-19T05:56:45","modified_gmt":"2021-10-19T05:56:45","slug":"anydesk-escalation-of-privilege-cve-2021-40854","status":"publish","type":"post","link":"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/","title":{"rendered":"AnyDesk Escalation of Privilege (CVE-2021-40854)"},"content":{"rendered":"<div class=\"addtoany_shortcode\"><div class=\"a2a_kit a2a_kit_size_32 addtoany_list\" data-a2a-url=\"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/\" data-a2a-title=\"AnyDesk Escalation of Privilege (CVE-2021-40854)\"><a class=\"a2a_button_copy_link\" href=\"https:\/\/www.addtoany.com\/add_to\/copy_link?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Copy Link\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_twitter\" href=\"https:\/\/www.addtoany.com\/add_to\/twitter?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_linkedin\" href=\"https:\/\/www.addtoany.com\/add_to\/linkedin?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_whatsapp\" href=\"https:\/\/www.addtoany.com\/add_to\/whatsapp?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"WhatsApp\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_viber\" href=\"https:\/\/www.addtoany.com\/add_to\/viber?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Viber\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook_messenger\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook_messenger?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Messenger\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_telegram\" href=\"https:\/\/www.addtoany.com\/add_to\/telegram?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Telegram\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_skype\" href=\"https:\/\/www.addtoany.com\/add_to\/skype?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Skype\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_sms\" href=\"https:\/\/www.addtoany.com\/add_to\/sms?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Message\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_dd addtoany_share_save addtoany_share\" href=\"https:\/\/www.addtoany.com\/share\"><\/a><\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Summary<\/strong><\/h1>\n\n\n\n<p><strong>Assigned CVE<\/strong>: <em>CVE-2021-40854<\/em> has been assigned for the report of RedyOps Labs.<\/p>\n\n\n\n<p><strong>Known to Neurosoft&#8217;s RedyOps Labs since<\/strong>: 20\/07\/2021<\/p>\n\n\n\n<p><strong>Exploit<\/strong> <strong>Code<\/strong>: N\/A<\/p>\n\n\n\n<p><strong>Vendor&#8217;s Advisory<\/strong>: <a href=\"https:\/\/anydesk.com\/cve\/2021-40854\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/anydesk.com\/cve\/2021-40854\/ <\/a><\/p>\n\n\n\n<p>An Elevation of Privilege (EoP) exists in AnyDesk for Windows from versions 3.1.0 to 6.3.2 (excluding 6.2.6). The vulnerability described gives the ability to a low privileged user to gain access as NT AUTHORITY\\SYSTEM.  <\/p>\n\n\n\n<p>The exploitation took place in an installed version of AnyDesk .<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Description<\/strong><\/h1>\n\n\n\n<p>When someone asks to perform a connection to your AnyDesk, the User Interface (UI) which is presented in order for you to accept the connection and specify the permissions, runs as NT AUTHORITY\\SYSTEM.<\/p>\n\n\n\n<p>In this same UI, you can open the chat log, by pressing the &#8220;Open Chat Log&#8221;. The notepad which opens, runs as NT AUTHORITY\\SYSTEM . <\/p>\n\n\n\n<p>The escalation from that point is trivial, as presented in the following video.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Exploitation<\/strong><\/h1>\n\n\n\n<p>In order to Exploit the issue, no special program is needed . <\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Video PoC Step By Step<\/strong><\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Eop Anydesk-CVE-2021-40854\" width=\"525\" height=\"295\" src=\"https:\/\/www.youtube.com\/embed\/DdRTbUkP860?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>The video is pretty match easy to follow.<\/p>\n\n\n\n<p>A low privileged user, opens the AnyDesk and performs a connection to his own ID. <\/p>\n\n\n\n<p>In the popup, he opens the &#8220;Chat Log&#8221; and from inside the notepad the low privileged user, spawns a cmd.exe as NT AUTHORITY\\SYSTEM. <\/p>\n\n\n<div class=\"addtoany_shortcode\"><div class=\"a2a_kit a2a_kit_size_32 addtoany_list\" data-a2a-url=\"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/\" data-a2a-title=\"AnyDesk Escalation of Privilege (CVE-2021-40854)\"><a class=\"a2a_button_copy_link\" href=\"https:\/\/www.addtoany.com\/add_to\/copy_link?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Copy Link\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_twitter\" href=\"https:\/\/www.addtoany.com\/add_to\/twitter?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_linkedin\" href=\"https:\/\/www.addtoany.com\/add_to\/linkedin?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_whatsapp\" href=\"https:\/\/www.addtoany.com\/add_to\/whatsapp?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"WhatsApp\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_viber\" href=\"https:\/\/www.addtoany.com\/add_to\/viber?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Viber\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook_messenger\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook_messenger?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Messenger\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_telegram\" href=\"https:\/\/www.addtoany.com\/add_to\/telegram?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Telegram\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_skype\" href=\"https:\/\/www.addtoany.com\/add_to\/skype?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Skype\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_sms\" href=\"https:\/\/www.addtoany.com\/add_to\/sms?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2021%2F10%2F18%2Fanydesk-escalation-of-privilege-cve-2021-40854%2F&amp;linkname=AnyDesk%20Escalation%20of%20Privilege%20%28CVE-2021-40854%29\" title=\"Message\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_dd addtoany_share_save addtoany_share\" href=\"https:\/\/www.addtoany.com\/share\"><\/a><\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Resources<\/strong><\/h1>\n\n\n\n<p><strong>RedyOps team<\/strong><\/p>\n\n\n\n<p>RedyOps team, uses the 0-day exploits produced by Research Labs, before vendor releases any patch. They use it in special engagements and only for specific customers.<\/p>\n\n\n\n<p>You can find RedyOps team at&nbsp;<a href=\"https:\/\/redyops.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/redyops.com\/<\/a><\/p>\n\n\n\n<p><strong>Angel<\/strong><\/p>\n\n\n\n<p>Discovered 0-days which affect marine sector, are being contacted with the Angel Team. ANGEL has been designed and developed to meet the unique and diverse requirements of the merchant marine sector. It secures the vessel\u2019s business, IoT and crew networks by providing oversight, security threat alerting and control of the vessel\u2019s entire network.<\/p>\n\n\n\n<p>You can find Angel team at&nbsp;<a href=\"https:\/\/angelcyber.gr\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/angelcyber.gr\/<\/a><\/p>\n\n\n\n<p><strong>Illicium<\/strong><\/p>\n\n\n\n<p>Our 0-days cannot win Illicium. Today\u2019s information technology landscape is threatened by modern adversary security attacks, including 0-day exploits, polymorphic malwares, APTs and targeted attacks. These threats cannot be identified and mitigated using classic detection and prevention technologies; they can mimic valid user activity, do not have a signature, and do not occur in patterns. In response to attackers\u2019 evolution, defenders now have a new kind of weapon in their arsenal: Deception.<\/p>\n\n\n\n<p>You can find Illicium team at&nbsp;<a href=\"https:\/\/deceivewithillicium.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/deceivewithillicium.com\/<\/a><\/p>\n\n\n\n<p><strong>Neutrify<\/strong><\/p>\n\n\n\n<p>Discovered 0-days are being contacted to the Neutrify team, in order to develop related detection rules. Neutrify is Neurosoft\u2019s 24\u00d77 Security Operations Center, completely dedicated to threats monitoring and attacks detection. Beyond just monitoring, Neutrify offers additional capabilities including advanced forensic analysis and malware reverse engineering to analyze incidents.<\/p>\n\n\n\n<p>You can find Neutrify team at&nbsp;<a href=\"https:\/\/neurosoft.gr\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/neurosoft.gr\/contact\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary Assigned CVE: CVE-2021-40854 has been assigned for the report of RedyOps Labs. Known to Neurosoft&#8217;s RedyOps Labs since: 20\/07\/2021 Exploit Code: N\/A Vendor&#8217;s Advisory: https:\/\/anydesk.com\/cve\/2021-40854\/ An Elevation of Privilege (EoP) exists in AnyDesk for Windows from versions 3.1.0 to 6.3.2 (excluding 6.2.6). The vulnerability described gives the ability to a low privileged user to &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;AnyDesk Escalation of Privilege (CVE-2021-40854)&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[17,4],"tags":[31,22,3],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AnyDesk Escalation of Privilege (CVE-2021-40854) - REDYOPS Labs<\/title>\n<meta name=\"description\" content=\"An Elevation of Privilege (EoP) exists in AnyDesk for Windows from versions 3.1.0 to 6.3.2 (excluding 6.2.6). The vulnerability described gives the ability to a low privileged user to gain access as NT AUTHORITYSYSTEM. %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AnyDesk Escalation of Privilege (CVE-2021-40854)\" \/>\n<meta property=\"og:description\" content=\"An Elevation of Privilege (EoP) exists in AnyDesk for Windows from versions 3.1.0 to 6.3.2 (excluding 6.2.6). The vulnerability described gives the ability to a low privileged user to gain access as NT AUTHORITYSYSTEM.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/\" \/>\n<meta property=\"og:site_name\" content=\"REDYOPS Labs\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-18T09:51:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-19T05:56:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2021\/10\/anydesk.png\" \/>\n\t<meta property=\"og:image:width\" content=\"839\" \/>\n\t<meta property=\"og:image:height\" content=\"586\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"AnyDesk Escalation of Privilege (CVE-2021-40854)\" \/>\n<meta name=\"twitter:description\" content=\"An Elevation of Privilege (EoP) exists in AnyDesk for Windows from versions 3.1.0 to 6.3.2 (excluding 6.2.6). The vulnerability described gives the ability to a low privileged user to gain access as NT AUTHORITY\\SYSTEM.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2021\/10\/anydesk.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/\",\"url\":\"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/\",\"name\":\"AnyDesk Escalation of Privilege (CVE-2021-40854) - REDYOPS Labs\",\"isPartOf\":{\"@id\":\"https:\/\/labs.redyops.com\/#website\"},\"datePublished\":\"2021-10-18T09:51:21+00:00\",\"dateModified\":\"2021-10-19T05:56:45+00:00\",\"author\":{\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69\"},\"description\":\"An Elevation of Privilege (EoP) exists in AnyDesk for Windows from versions 3.1.0 to 6.3.2 (excluding 6.2.6). The vulnerability described gives the ability to a low privileged user to gain access as NT AUTHORITY\\\\SYSTEM. %\",\"breadcrumb\":{\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/labs.redyops.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AnyDesk Escalation of Privilege (CVE-2021-40854)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/labs.redyops.com\/#website\",\"url\":\"https:\/\/labs.redyops.com\/\",\"name\":\"REDYOPS Labs\",\"description\":\"Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/labs.redyops.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/labs.redyops.com\"],\"url\":\"https:\/\/labs.redyops.com\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AnyDesk Escalation of Privilege (CVE-2021-40854) - REDYOPS Labs","description":"An Elevation of Privilege (EoP) exists in AnyDesk for Windows from versions 3.1.0 to 6.3.2 (excluding 6.2.6). The vulnerability described gives the ability to a low privileged user to gain access as NT AUTHORITYSYSTEM. %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/","og_locale":"en_US","og_type":"article","og_title":"AnyDesk Escalation of Privilege (CVE-2021-40854)","og_description":"An Elevation of Privilege (EoP) exists in AnyDesk for Windows from versions 3.1.0 to 6.3.2 (excluding 6.2.6). The vulnerability described gives the ability to a low privileged user to gain access as NT AUTHORITYSYSTEM.","og_url":"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/","og_site_name":"REDYOPS Labs","article_published_time":"2021-10-18T09:51:21+00:00","article_modified_time":"2021-10-19T05:56:45+00:00","og_image":[{"width":839,"height":586,"url":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2021\/10\/anydesk.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"AnyDesk Escalation of Privilege (CVE-2021-40854)","twitter_description":"An Elevation of Privilege (EoP) exists in AnyDesk for Windows from versions 3.1.0 to 6.3.2 (excluding 6.2.6). The vulnerability described gives the ability to a low privileged user to gain access as NT AUTHORITY\\SYSTEM.","twitter_image":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2021\/10\/anydesk.png","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/","url":"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/","name":"AnyDesk Escalation of Privilege (CVE-2021-40854) - REDYOPS Labs","isPartOf":{"@id":"https:\/\/labs.redyops.com\/#website"},"datePublished":"2021-10-18T09:51:21+00:00","dateModified":"2021-10-19T05:56:45+00:00","author":{"@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69"},"description":"An Elevation of Privilege (EoP) exists in AnyDesk for Windows from versions 3.1.0 to 6.3.2 (excluding 6.2.6). The vulnerability described gives the ability to a low privileged user to gain access as NT AUTHORITY\\SYSTEM. %","breadcrumb":{"@id":"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/labs.redyops.com\/index.php\/2021\/10\/18\/anydesk-escalation-of-privilege-cve-2021-40854\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/labs.redyops.com\/"},{"@type":"ListItem","position":2,"name":"AnyDesk Escalation of Privilege (CVE-2021-40854)"}]},{"@type":"WebSite","@id":"https:\/\/labs.redyops.com\/#website","url":"https:\/\/labs.redyops.com\/","name":"REDYOPS Labs","description":"Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/labs.redyops.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/labs.redyops.com"],"url":"https:\/\/labs.redyops.com\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/332"}],"collection":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":3,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/332\/revisions"}],"predecessor-version":[{"id":338,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/332\/revisions\/338"}],"wp:attachment":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/media?parent=332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/categories?post=332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/tags?post=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}