Lucene search

K
kasperskyKaspersky LabKLA12383
HistoryDec 14, 2021 - 12:00 a.m.

KLA12383 Multiple vulnerabilities in Microsoft System Center

2021-12-1400:00:00
Kaspersky Lab
threats.kaspersky.com
18

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.057 Low

EPSS

Percentile

93.4%

Multiple vulnerabilities were found in Microsoft System Center. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Defender for IoT can be exploited remotely to execute arbitrary code.
  2. An elevation of privilege vulnerability in Microsoft Defender for IOT can be exploited remotely to gain privileges.
  3. An information disclosure vulnerability in Microsoft Defender for IoT can be exploited remotely to obtain sensitive information.

Original advisories

CVE-2021-42315

CVE-2021-41365

CVE-2021-42310

CVE-2021-43889

CVE-2021-42314

CVE-2021-42313

CVE-2021-42311

CVE-2021-43882

CVE-2021-42312

CVE-2021-43888

Related products

Windows-Defender

CVE list

CVE-2021-42315 critical

CVE-2021-41365 critical

CVE-2021-42310 critical

CVE-2021-43889 high

CVE-2021-42314 critical

CVE-2021-42313 critical

CVE-2021-42311 critical

CVE-2021-43882 critical

CVE-2021-42312 critical

CVE-2021-43888 critical

KB list

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Microsoft Defender for IoT

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.057 Low

EPSS

Percentile

93.4%