The essence of this vulnerability is that if you perform a shadow copy of your important files with hashed passwords for all OS accounts, encryption key data, and other important information (the files stored in SAM, SECURITY and SYSTEM) - you will be able to read them immediately with standard user rights.
Whereas in a standard situation, after performing a shadow copy, you can’t read the specified files with user rights. In other words, you will be able to elevate privileges after obtaining the desired password hash.
Are there any ways to fix it, without installing the latest Windows updates?
We are using a Workaround
Create a .bat File
Create a File Called Windows_10_all.mof
Create a GPO for the Startup Script
Copy the Above batch into the created directory.
Use MWI Filter
Goto WMI Filter, rightclick import the file from above
or do it lazy, by create it manually
After that, select your GPO on the left side and afterwards select on the right downside your WMI Filter.
Conclusions
This is just a Workaround which Microsoft tells to do, most Websites only Explain to fix the File instead of Folder Permissions.