Description
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A denial of service vulnerability in Windows Trust Verification API can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Event Tracing can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Remote Procedure Call can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows PKU2U can be exploited remotely to gain privileges.
- A denial of service vulnerability in Windows TCP/IP can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows TCP/IP can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Address Book can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Fax Service can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Local Spooler can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Windows VMSwitch can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Microsoft Windows can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows Backup Engine can be exploited remotely to obtain sensitive information.
Original advisories
- CVE-2021-24103
- CVE-2021-1734
- CVE-2021-25195
- CVE-2021-24086
- CVE-2021-1727
- CVE-2021-24102
- CVE-2021-24094
- CVE-2021-24078
- CVE-2021-24083
- CVE-2021-1722
- CVE-2021-24074
- CVE-2021-24088
- CVE-2021-24077
- CVE-2021-24076
- CVE-2020-17162
- CVE-2021-24079
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
CVE list
- CVE-2021-24080 high
- CVE-2021-24103 critical
- CVE-2021-1734 critical
- CVE-2021-25195 critical
- CVE-2021-24086 critical
- CVE-2021-1727 critical
- CVE-2021-24102 critical
- CVE-2021-24094 critical
- CVE-2021-24076 high
- CVE-2021-24078 critical
- CVE-2021-24083 critical
- CVE-2021-24079 high
- CVE-2021-1722 critical
- CVE-2021-24074 critical
- CVE-2021-24088 critical
- CVE-2021-24077 critical
- CVE-2020-17162 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!