Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Windows Encrypting File System (EFS) can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows NTFS can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Storage Spaces Controller can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in HEVC Video Extensions can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Local Security Authority Server (lsasrv) can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in DirectX Graphics Kernel File can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Remote Access can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Recovery Environment Agent can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Event Tracing can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Fax Service can be exploited remotely to execute arbitrary code.
- A memory corruption vulnerability in iSNS Server can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Mobile Device Management can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Setup can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Encrypting File System (EFS) can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows TCP/IP Driver can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Microsoft Message Queuing can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in VP9 Video Extensions can be exploited remotely to obtain sensitive information.
- A denial of service vulnerability in SymCrypt can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Digital TV Tuner can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Web Media Extensions can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Media Center can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Digital Media Receiver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Print Spooler can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in NTFS Set Short Name can be exploited remotely to gain privileges.
Первичный источник обнаружения
- CVE-2021-43217
CVE-2021-43246
CVE-2021-43231
CVE-2021-43227
CVE-2021-40452
CVE-2021-43216
CVE-2021-43219
CVE-2021-43235
CVE-2021-43223
CVE-2021-43238
CVE-2021-43883
CVE-2021-43229
CVE-2021-43239
CVE-2021-43226
CVE-2021-43232
CVE-2021-43234
CVE-2021-40453
CVE-2021-43215
CVE-2021-43880
CVE-2021-43237
CVE-2021-43893
CVE-2021-43230
CVE-2021-43224
CVE-2021-43247
CVE-2021-43222
CVE-2021-41360
CVE-2021-43244
CVE-2021-43233
CVE-2021-43243
CVE-2021-43228
CVE-2021-43245
CVE-2021-43214
CVE-2021-40441
CVE-2021-43248
CVE-2021-41333
CVE-2021-43236
CVE-2021-43207
CVE-2021-43240
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
Список CVE
- CVE-2021-43217 critical
- CVE-2021-43246 high
- CVE-2021-43231 critical
- CVE-2021-43227 high
- CVE-2021-40452 critical
- CVE-2021-43216 high
- CVE-2021-43219 critical
- CVE-2021-43235 high
- CVE-2021-43223 critical
- CVE-2021-43238 critical
- CVE-2021-43883 critical
- CVE-2021-43229 critical
- CVE-2021-43239 critical
- CVE-2021-43226 critical
- CVE-2021-43232 critical
- CVE-2021-43234 critical
- CVE-2021-40453 critical
- CVE-2021-43215 critical
- CVE-2021-43880 high
- CVE-2021-43237 high
- CVE-2021-43893 critical
- CVE-2021-43230 critical
- CVE-2021-43224 high
- CVE-2021-43247 critical
- CVE-2021-43222 critical
- CVE-2021-41360 critical
- CVE-2021-43244 high
- CVE-2021-43233 critical
- CVE-2021-43243 high
- CVE-2021-43228 critical
- CVE-2021-43245 critical
- CVE-2021-43214 critical
- CVE-2021-40441 critical
- CVE-2021-43248 critical
- CVE-2021-41333 critical
- CVE-2021-43236 critical
- CVE-2021-43207 critical
- CVE-2021-43240 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!