Lucene search

K
kasperskyKaspersky LabKLA12167
HistoryMay 11, 2021 - 12:00 a.m.

KLA12167 Multiple vulnerabilities in Microsoft Products (ESU)

2021-05-1100:00:00
Kaspersky Lab
threats.kaspersky.com
33

CVSS2

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.1

Confidence

Low

EPSS

0.937

Percentile

99.1%

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Hyper-V can be exploited remotely to execute arbitrary code.
  2. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  3. An information disclosure vulnerability in Windows Remote Desktop Protocol (RDP) can be exploited remotely to obtain sensitive information.
  4. A spoofing vulnerability in Windows Wireless Networking can be exploited remotely to spoof user interface.
  5. An information disclosure vulnerability in Microsoft Windows Infrared Data Association (IrDA) can be exploited remotely to obtain sensitive information.
  6. A spoofing vulnerability in Microsoft Bluetooth Driver can be exploited remotely to spoof user interface.
  7. An elevation of privilege vulnerability in Windows SSDP Service can be exploited remotely to gain privileges.
  8. A remote code execution vulnerability in Microsoft Jet Red Database Engine and Access Connectivity Engine can be exploited remotely to execute arbitrary code.
  9. A remote code execution vulnerability in OLE Automation can be exploited remotely to execute arbitrary code.
  10. An information disclosure vulnerability in Windows Wireless Networking can be exploited remotely to obtain sensitive information.
  11. A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.

Original advisories

CVE-2021-28476

CVE-2021-31188

CVE-2021-31186

CVE-2020-24588

CVE-2021-31184

CVE-2021-31182

CVE-2020-26144

CVE-2021-31193

CVE-2021-28455

CVE-2021-31194

CVE-2020-24587

CVE-2021-26419

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Internet-Explorer

Microsoft-Office

Microsoft-Windows

Microsoft-Windows-Server

Microsoft-Windows-Server-2012

Microsoft-Windows-8

Microsoft-Windows-7

Microsoft-Windows-Server-2008

Windows-RT

Microsoft-Windows-10

CVE list

CVE-2021-28476 critical

CVE-2021-31188 critical

CVE-2021-31186 high

CVE-2020-24588 warning

CVE-2021-31184 high

CVE-2021-31182 high

CVE-2020-26144 high

CVE-2021-31193 critical

CVE-2021-28455 critical

CVE-2021-31194 critical

CVE-2020-24587 warning

CVE-2021-26419 critical

KB list

5003228

5003233

5003210

5003165

5003225

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

  • SUI

Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.

Affected Products

  • Windows Server, version 1909 (Server Core installation)Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Microsoft Office 2013 Service Pack 1 (32-bit editions)Windows 10 Version 1803 for x64-based SystemsInternet Explorer 11Windows 10 for x64-based SystemsWindows 10 Version 1809 for x64-based SystemsWindows 8.1 for 32-bit systemsInternet Explorer 9Windows 10 Version 1809 for ARM64-based SystemsWindows 10 Version 20H2 for ARM64-based SystemsMicrosoft Office 2016 (64-bit edition)Microsoft Office 2016 (32-bit edition)Windows 10 Version 1909 for ARM64-based SystemsWindows Server, version 2004 (Server Core installation)Windows 10 Version 1607 for x64-based SystemsWindows 10 Version 20H2 for 32-bit SystemsWindows 10 Version 1909 for 32-bit SystemsMicrosoft Office 2013 RT Service Pack 1Windows 10 Version 2004 for x64-based SystemsWindows Server 2019 (Server Core installation)Microsoft Office 2019 for 32-bit editionsWindows Server 2012 R2 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows 10 Version 1909 for x64-based SystemsWindows Server 2012Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2012 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows RT 8.1Windows 7 for 32-bit Systems Service Pack 1Windows 10 for 32-bit SystemsMicrosoft 365 Apps for Enterprise for 32-bit SystemsWindows Server 2019Microsoft Office 2019 for 64-bit editionsWindows 10 Version 1607 for 32-bit SystemsWindows Server 2016Windows Server 2008 for 32-bit Systems Service Pack 2Windows 10 Version 1809 for 32-bit SystemsWindows 10 Version 1803 for ARM64-based SystemsWindows 10 Version 20H2 for x64-based SystemsWindows 10 Version 2004 for ARM64-based SystemsMicrosoft Office 2013 Service Pack 1 (64-bit editions)Windows 10 Version 2004 for 32-bit SystemsMicrosoft 365 Apps for Enterprise for 64-bit SystemsWindows Server 2012 R2Windows Server 2016 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows 7 for x64-based Systems Service Pack 1Windows 10 Version 1803 for 32-bit SystemsWindows Server, version 20H2 (Server Core Installation)Windows 8.1 for x64-based systems

References

CVSS2

7.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.1

Confidence

Low

EPSS

0.937

Percentile

99.1%