Lucene search

K
kasperskyKaspersky LabKLA12174
HistoryMay 11, 2021 - 12:00 a.m.

KLA12174 Multiple vulnerabilities in Microsoft Windows

2021-05-1100:00:00
Kaspersky Lab
threats.kaspersky.com
47

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.973 High

EPSS

Percentile

99.9%

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface, obtain sensitive information, bypass security restrictions, cause denial of service.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Hyper-V can be exploited remotely to execute arbitrary code.
  2. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  3. A spoofing vulnerability in Windows Wireless Networking can be exploited remotely to spoof user interface.
  4. A remote code execution vulnerability in HTTP Protocol Stack can be exploited remotely to execute arbitrary code.
  5. A remote code execution vulnerability in Windows Media Foundation Core can be exploited remotely to execute arbitrary code.
  6. An information disclosure vulnerability in Microsoft Windows Infrared Data Association (IrDA) can be exploited remotely to obtain sensitive information.
  7. A remote code execution vulnerability in Web Media Extensions can be exploited remotely to execute arbitrary code.
  8. An elevation of privilege vulnerability in Windows Container Manager Service can be exploited remotely to gain privileges.
  9. An information disclosure vulnerability in Windows Projected File System FS Filter Driver can be exploited remotely to obtain sensitive information.
  10. A security feature bypass vulnerability in Windows SMB Client can be exploited remotely to bypass security restrictions.
  11. An elevation of privilege vulnerability in Windows WalletService can be exploited remotely to gain privileges.
  12. An elevation of privilege vulnerability in Windows SSDP Service can be exploited remotely to gain privileges.
  13. A remote code execution vulnerability in Microsoft Jet Red Database Engine and Access Connectivity Engine can be exploited remotely to execute arbitrary code.
  14. An information disclosure vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely to obtain sensitive information.
  15. An elevation of privilege vulnerability in Windows Container Isolation FS Filter Driver can be exploited remotely to gain privileges.
  16. A spoofing vulnerability in Microsoft Bluetooth Driver can be exploited remotely to spoof user interface.
  17. A denial of service vulnerability in Windows Desktop Bridge can be exploited remotely to cause denial of service.
  18. An information disclosure vulnerability in Windows CSC Service can be exploited remotely to obtain sensitive information.
  19. A remote code execution vulnerability in OLE Automation can be exploited remotely to execute arbitrary code.
  20. An information disclosure vulnerability in Windows Wireless Networking can be exploited remotely to obtain sensitive information.

Original advisories

CVE-2021-28476

CVE-2021-31188

CVE-2020-24588

CVE-2021-31166

CVE-2021-31192

CVE-2021-31184

CVE-2021-28465

CVE-2021-31167

CVE-2021-31191

CVE-2021-31205

CVE-2021-31208

CVE-2021-31187

CVE-2020-26144

CVE-2021-31193

CVE-2021-28455

CVE-2021-31186

CVE-2021-31165

CVE-2021-31190

CVE-2021-31182

CVE-2021-31185

CVE-2021-28479

CVE-2021-31168

CVE-2021-31169

CVE-2021-31194

CVE-2021-31170

CVE-2020-24587

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Windows

Microsoft-Windows-Server

Microsoft-Windows-Server-2012

Microsoft-Windows-8

Microsoft-Windows-7

Microsoft-Windows-Server-2008

Windows-RT

Microsoft-Windows-10

CVE list

CVE-2021-28476 critical

CVE-2021-31188 critical

CVE-2021-31186 high

CVE-2020-24588 warning

CVE-2021-31184 high

CVE-2021-31182 high

CVE-2020-26144 high

CVE-2021-31193 critical

CVE-2021-28455 critical

CVE-2021-31194 critical

CVE-2020-24587 warning

CVE-2021-31166 critical

CVE-2021-31192 critical

CVE-2021-28465 critical

CVE-2021-31167 critical

CVE-2021-31191 high

CVE-2021-31205 high

CVE-2021-31208 critical

CVE-2021-31187 critical

CVE-2021-31165 critical

CVE-2021-31190 critical

CVE-2021-31185 high

CVE-2021-28479 high

CVE-2021-31168 critical

CVE-2021-31169 critical

CVE-2021-31170 critical

KB list

5003209

5003197

5003174

5003208

5003171

5003172

5003169

5003173

5003203

5003220

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Windows Server, version 1909 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows 10 Version 1803 for x64-based SystemsWindows 10 for x64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 8.1 for 32-bit systemsWindows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 20H2 for ARM64-based SystemsWindows 10 Version 1909 for ARM64-based SystemsWindows Server, version 2004 (Server Core installation)Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 20H2 for 32-bit SystemsWindows 10 Version 1909 for 32-bit SystemsWindows 10 Version 2004 for x64-based SystemsWindows Server 2019 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows 10 Version 1909 for x64-based SystemsWindows Server 2012Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2012 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows RT 8.1Windows 7 for 32-bit Systems Service Pack 1Windows 10 for 32-bit SystemsWindows Server 2019Windows 10 Version 1607 for 32-bit SystemsWindows Server 2016Windows Server 2008 for 32-bit Systems Service Pack 2Windows 10 Version 1809 for 32-bit SystemsWindows 10 Version 1803 for ARM64-based SystemsWindows 10 Version 20H2 for x64-based SystemsWindows 10 Version 2004 for ARM64-based SystemsWindows 10 Version 2004 for 32-bit SystemsWindows Server 2012 R2Windows Server 2016 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows 7 for x64-based Systems Service Pack 1Windows 10 Version 1803 for 32-bit SystemsWindows Server, version 20H2 (Server Core Installation)Windows 8.1 for x64-based systems

References

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.973 High

EPSS

Percentile

99.9%