Дата обнаружения
|
08/06/2021 |
Уровень угрозы
|
Critical |
Описание
|
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, bypass security restrictions. Below is a complete list of vulnerabilities:
|
Эксплуатация
|
The following public exploits exists for this vulnerability: https://github.com/hzshang/CVE-2021-31956 https://github.com/r1skkam/PrintNightmare https://github.com/zha0/Microsoft-CVE-2021-1675 Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Пораженные продукты
|
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2021-31956 CVE-2021-31973 CVE-2021-33742 CVE-2021-31954 CVE-2021-31201 CVE-2021-31199 CVE-2021-1675 CVE-2021-31953 CVE-2021-31968 CVE-2021-31958 CVE-2021-31971 CVE-2021-26414 CVE-2021-31959 CVE-2021-31962 |
Оказываемое влияние
?
|
ACE
[?]
DoS
[?]
SB
[?]
PE
[?]
|
Связанные продукты
|
Microsoft Windows Microsoft Windows Server Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Server 2008 Windows RT Microsoft Windows 10 |
CVE-IDS
|
CVE-2021-319569.3Critical
CVE-2021-319734.6Warning CVE-2021-337426.8High CVE-2021-319547.2High CVE-2021-312014.6Warning CVE-2021-311994.6Warning CVE-2021-16759.3Critical CVE-2021-319534.6Warning CVE-2021-319685.0Critical CVE-2021-319586.8High CVE-2021-319716.8High CVE-2021-264144.3Warning CVE-2021-319596.8High CVE-2021-319627.5Critical |