Дата обнаружения
|
09/02/2021 |
Уровень угрозы
|
Critical |
Описание
|
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, obtain sensitive information. Below is a complete list of vulnerabilities:
|
Эксплуатация
|
The following public exploits exists for this vulnerability: https://github.com/lisinan988/CVE-2021-24086-exp https://github.com/klinix5/CVE-2021-1727 Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Пораженные продукты
|
Windows 10 Version 1909 for ARM64-based Systems |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2021-24080 CVE-2021-24103 CVE-2021-24083 CVE-2021-1722 CVE-2021-24074 CVE-2021-24088 CVE-2021-1734 CVE-2021-25195 CVE-2021-24077 CVE-2021-1727 CVE-2021-24094 CVE-2021-24086 CVE-2021-24102 CVE-2021-24078 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
PE
[?]
|
Связанные продукты
|
Microsoft Windows Microsoft Windows Server Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Server 2008 Windows RT Microsoft Windows 10 |
CVE-IDS
|
CVE-2021-240804.3Warning
CVE-2021-241034.6Warning CVE-2021-17345.0Critical CVE-2021-251954.6Warning CVE-2021-240865.0Critical CVE-2021-17274.6Warning CVE-2021-241024.6Warning CVE-2021-240947.5Critical CVE-2021-240787.5Critical CVE-2021-240836.8High CVE-2021-17227.5Critical CVE-2021-240747.5Critical CVE-2021-240886.5High CVE-2021-240777.5Critical |
KB list
|