A temporary fix has been issued for CVE-2021-24084, which can be exploited using the LPE exploitation approach for the HiveNightmare/SeriousSAM bug. The issue has yet to get an official fix, making it a zero-day bug but a micropatch has been rolled out as a stop-gap measure. A normal user can make use of the export your management log files function, which triggers the Device Management Enrollment Service.”]
Source: https://threatpost.com/unpatched-windows-zero-day-privileged-file-access/176609/

