Kaspersky ID:
KLA12221
Detect Date:
07/13/2021
Updated:
02/02/2024

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, gain privileges, bypass security restrictions, obtain sensitive information, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
  2. A remote code execution vulnerability in Windows MSHTML Platform can be exploited remotely to execute arbitrary code.
  3. An elevation of privilege vulnerability in Windows Console Driver can be exploited remotely to gain privileges.
  4. A remote code execution vulnerability in HEVC Video Extensions can be exploited remotely to execute arbitrary code.
  5. A denial of service vulnerability in Windows TCP/IP Driver can be exploited remotely to cause denial of service.
  6. A denial of service vulnerability in Windows DNS Server can be exploited remotely to cause denial of service.
  7. A security feature bypass vulnerability in Active Directory can be exploited remotely to bypass security restrictions.
  8. An information disclosure vulnerability in Win32k can be exploited remotely to obtain sensitive information.
  9. A remote code execution vulnerability in Windows Address Book can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in Windows Event Tracing can be exploited remotely to gain privileges.
  12. An elevation of privilege vulnerability in Storage Spaces Controller can be exploited remotely to gain privileges.
  13. A denial of service vulnerability in Windows LSA can be exploited remotely to cause denial of service.
  14. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  15. A remote code execution vulnerability in Windows DNS Server can be exploited remotely to execute arbitrary code.
  16. A remote code execution vulnerability in Microsoft Windows Media Foundation can be exploited remotely to execute arbitrary code.
  17. A security feature bypass vulnerability in Windows HTML Platforms can be exploited remotely to bypass security restrictions.
  18. An information disclosure vulnerability in Media Foundation can be exploited remotely to obtain sensitive information.
  19. An elevation of privilege vulnerability in Windows Partition Management Driver can be exploited remotely to gain privileges.
  20. An elevation of privilege vulnerability in Windows AppContainer can be exploited remotely to gain privileges.
  21. A security feature bypass vulnerability in Windows Secure Kernel Mode can be exploited remotely to bypass security restrictions.
  22. An information disclosure vulnerability in GDI+ can be exploited remotely to obtain sensitive information.
  23. A remote code execution vulnerability in Windows DNS Snap-in can be exploited remotely to execute arbitrary code.
  24. An information disclosure vulnerability in Windows Key Distribution Center can be exploited remotely to obtain sensitive information.
  25. An elevation of privilege vulnerability in Windows Projected File System can be exploited remotely to gain privileges.
  26. A security feature bypass vulnerability in Windows Security Account Manager Remote Protocol can be exploited remotely to bypass security restrictions.
  27. A remote code execution vulnerability in DirectWrite can be exploited remotely to execute arbitrary code.
  28. An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
  29. An information disclosure vulnerability in Windows Remote Assistance can be exploited remotely to obtain sensitive information.
  30. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  31. A denial of service vulnerability in Bowser.sys can be exploited remotely to cause denial of service.
  32. An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
  33. A remote code execution vulnerability in Windows Kernel can be exploited remotely to execute arbitrary code.
  34. An information disclosure vulnerability in Windows Kernel Memory can be exploited remotely to obtain sensitive information.
  35. An information disclosure vulnerability in Windows GDI can be exploited remotely to obtain sensitive information.
  36. An information disclosure vulnerability in Windows SMB can be exploited remotely to obtain sensitive information.
  37. A spoofing vulnerability in Windows Certificate can be exploited remotely to spoof user interface.
  38. An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
  39. A denial of service vulnerability in Windows AF_UNIX Socket Provider can be exploited remotely to cause denial of service.
  40. A spoofing vulnerability in Windows Installer can be exploited remotely to spoof user interface.
  41. A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.
  42. A security feature bypass vulnerability in Windows LSA can be exploited remotely to bypass security restrictions.
  43. An elevation of privilege vulnerability in Windows Container Isolation FS Filter Driver can be exploited remotely to gain privileges.
  44. An elevation of privilege vulnerability in Windows AppX Deployment Extensions can be exploited remotely to gain privileges.
  45. A security feature bypass vulnerability in Windows Hello can be exploited remotely to bypass security restrictions.
  46. An elevation of privilege vulnerability in Windows Desktop Bridge can be exploited remotely to gain privileges.
  47. A security feature bypass vulnerability in Windows ADFS can be exploited remotely to bypass security restrictions.
  48. An information disclosure vulnerability in Storage Spaces Controller can be exploited remotely to obtain sensitive information.
  49. A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
  50. A remote code execution vulnerability in Windows Font Driver Host can be exploited remotely to execute arbitrary code.
  51. An elevation of privilege vulnerability in Windows InstallService can be exploited remotely to gain privileges.
  52. An elevation of privilege vulnerability in Windows File History Service can be exploited remotely to gain privileges.
  53. An elevation of privilege vulnerability in Windows GDI can be exploited remotely to gain privileges.
  54. A remote code execution vulnerability in Raw Image Extension can be exploited remotely to execute arbitrary code.
  55. A remote code execution vulnerability in Windows Media can be exploited remotely to execute arbitrary code.
  56. A spoofing vulnerability in Windows Authenticode can be exploited remotely to spoof user interface.

Original advisories

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2021-33758
    critical
  • CVE-2021-34497
    high
  • CVE-2021-34488
    critical
  • CVE-2021-33775
    critical
  • CVE-2021-34490
    critical
  • CVE-2021-34444
    high
  • CVE-2021-33781
    critical
  • CVE-2021-34491
    high
  • CVE-2021-34504
    critical
  • CVE-2021-34456
    critical
  • CVE-2021-33774
    high
  • CVE-2021-34513
    critical
  • CVE-2021-33788
    critical
  • CVE-2021-33771
    critical
  • CVE-2021-34494
    critical
  • CVE-2021-34503
    critical
  • CVE-2021-34446
    critical
  • CVE-2021-33760
    high
  • CVE-2021-31183
    critical
  • CVE-2021-34510
    critical
  • CVE-2021-34493
    high
  • CVE-2021-33761
    critical
  • CVE-2021-34459
    critical
  • CVE-2021-33744
    high
  • CVE-2021-33755
    high
  • CVE-2021-33745
    high
  • CVE-2021-34440
    high
  • CVE-2021-33749
    critical
  • CVE-2021-33764
    high
  • CVE-2021-33743
    critical
  • CVE-2021-33757
    high
  • CVE-2021-34489
    critical
  • CVE-2021-34441
    critical
  • CVE-2021-33784
    critical
  • CVE-2021-34525
    critical
  • CVE-2021-34507
    high
  • CVE-2021-34516
    critical
  • CVE-2021-31947
    critical
  • CVE-2021-33780
    critical
  • CVE-2021-34476
    critical
  • CVE-2021-34511
    critical
  • CVE-2021-34458
    critical
  • CVE-2021-34500
    high
  • CVE-2021-34512
    critical
  • CVE-2021-34496
    high
  • CVE-2021-34460
    critical
  • CVE-2021-33783
    high
  • CVE-2021-34492
    critical
  • CVE-2021-33763
    high
  • CVE-2021-33785
    critical
  • CVE-2021-34442
    critical
  • CVE-2021-33765
    high
  • CVE-2021-34450
    critical
  • CVE-2021-33786
    critical
  • CVE-2021-34461
    critical
  • CVE-2021-34462
    high
  • CVE-2021-34466
    high
  • CVE-2021-33754
    critical
  • CVE-2021-33752
    critical
  • CVE-2021-33750
    critical
  • CVE-2021-33776
    critical
  • CVE-2021-33759
    critical
  • CVE-2021-33779
    critical
  • CVE-2021-31979
    critical
  • CVE-2021-33756
    critical
  • CVE-2021-34509
    high
  • CVE-2021-34508
    critical
  • CVE-2021-33751
    high
  • CVE-2021-34449
    high
  • CVE-2021-33777
    critical
  • CVE-2021-34448
    high
  • CVE-2021-34499
    high
  • CVE-2021-34438
    critical
  • CVE-2021-34457
    high
  • CVE-2021-34445
    critical
  • CVE-2021-31961
    high
  • CVE-2021-34455
    critical
  • CVE-2021-33772
    critical
  • CVE-2021-33746
    critical
  • CVE-2021-34498
    critical
  • CVE-2021-34447
    high
  • CVE-2021-34521
    critical
  • CVE-2021-33778
    critical
  • CVE-2021-34439
    critical
  • CVE-2021-33740
    critical
  • CVE-2021-33782
    high
  • CVE-2021-34514
    critical
  • CVE-2021-34454
    high
  • CVE-2021-33773
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.