Дата обнаружения
|
14/09/2021 |
Уровень угрозы
|
Critical |
Описание
|
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, cause denial of service, bypass security restrictions, execute arbitrary code, spoof user interface. Below is a complete list of vulnerabilities:
|
Эксплуатация
|
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Пораженные продукты
|
Windows Server 2012 R2 (Server Core installation) |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2021-36973 CVE-2021-38635 CVE-2021-36962 CVE-2021-38628 CVE-2021-36961 CVE-2021-38638 CVE-2021-36964 CVE-2021-38632 CVE-2021-38644 CVE-2021-36967 CVE-2021-36959 CVE-2021-36960 CVE-2021-38636 CVE-2021-38634 CVE-2021-36972 CVE-2021-36969 CVE-2021-26435 CVE-2021-36955 CVE-2021-38630 CVE-2021-38671 CVE-2021-40447 CVE-2021-36974 CVE-2021-38629 CVE-2021-38639 CVE-2021-36966 CVE-2021-38667 CVE-2021-36965 CVE-2021-36963 CVE-2021-38624 CVE-2021-38661 CVE-2021-36954 CVE-2021-38633 CVE-2021-36975 CVE-2021-38637 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
PE
[?]
SUI
[?]
|
Связанные продукты
|
Microsoft Windows Microsoft Windows Server Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Server 2008 Windows RT Microsoft Windows 10 Microsoft Windows Server 2016 Microsoft Windows Server 2019 |
KB list
|
5005613 |