Lucene search

K
cvelistMicrosoftCVELIST:CVE-2021-1647
HistoryJan 12, 2021 - 7:42 p.m.

CVE-2021-1647 Microsoft Defender Remote Code Execution Vulnerability

2021-01-1219:42:01
microsoft
www.cve.org
3

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

0.097 Low

EPSS

Percentile

94.8%

CNA Affected

[
  {
    "vendor": "Microsoft",
    "product": "Microsoft System Center Endpoint Protection",
    "cpes": [],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft System Center 2012 R2 Endpoint Protection",
    "cpes": [],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft Security Essentials",
    "cpes": [],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft System Center 2012 Endpoint Protection",
    "cpes": [],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Windows Defender",
    "cpes": [],
    "platforms": [
      "Windows 10 Version 1803 for 32-bit Systems",
      "Windows 10 Version 1803 for x64-based Systems",
      "Windows 10 Version 1803 for ARM64-based Systems",
      "Windows 10 Version 1809 for 32-bit Systems",
      "Windows 10 Version 1809 for x64-based Systems",
      "Windows 10 Version 1809 for ARM64-based Systems",
      "Windows Server 2019",
      "Windows Server 2019 (Server Core installation)",
      "Windows 10 Version 1909 for 32-bit Systems",
      "Windows 10 Version 1909 for x64-based Systems",
      "Windows 10 Version 1909 for ARM64-based Systems",
      "Windows Server, version 1909 (Server Core installation)",
      "Windows 10 Version 2004 for 32-bit Systems",
      "Windows 10 Version 2004 for ARM64-based Systems",
      "Windows 10 Version 2004 for x64-based Systems",
      "Windows Server, version 2004 (Server Core installation)",
      "Windows 10 Version 20H2 for 32-bit Systems",
      "Windows 10 Version 20H2 for ARM64-based Systems",
      "Windows Server, version 20H2 (Server Core Installation)",
      "Windows 10 for 32-bit Systems",
      "Windows 10 for x64-based Systems",
      "Windows 10 Version 1607 for 32-bit Systems",
      "Windows 10 Version 1607 for x64-based Systems",
      "Windows Server 2016",
      "Windows Server 2016 (Server Core installation)",
      "Windows 7 for 32-bit Systems Service Pack 1",
      "Windows 7 for x64-based Systems Service Pack 1",
      "Windows 8.1 for 32-bit systems",
      "Windows 8.1 for x64-based systems",
      "Windows RT 8.1",
      "Windows Server 2008 for 32-bit Systems Service Pack 2",
      "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)",
      "Windows Server 2008 R2 for x64-based Systems Service Pack 1",
      "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)",
      "Windows Server 2012",
      "Windows Server 2012 (Server Core installation)",
      "Windows Server 2012 R2",
      "Windows Server 2012 R2 (Server Core installation)"
    ],
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

0.097 Low

EPSS

Percentile

94.8%