Lucene search

K
kasperskyKaspersky LabKLA12221
HistoryJul 13, 2021 - 12:00 a.m.

KLA12221 Multiple vulnerabillities in Microsoft Windows

2021-07-1300:00:00
Kaspersky Lab
threats.kaspersky.com
44

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.958 High

EPSS

Percentile

99.4%

Detect date:

07/13/2021

Severity:

Critical

Description:

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, gain privileges, bypass security restrictions, obtain sensitive information, spoof user interface.

Exploitation:

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Affected products:

Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows Server 2012
Windows RT 8.1
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 for 32-bit Systems
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for x64-based systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows Server, version 1909 (Server Core installation)
Windows 8.1 for 32-bit systems
Windows Server 2012 (Server Core installation)
Windows 10 Version 21H1 for 32-bit Systems
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2012 R2
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
HEVC Video Extensions
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 1809 for x64-based Systems

Solution:

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories:

CVE-2021-33758
CVE-2021-34497
CVE-2021-34488
CVE-2021-33775
CVE-2021-34490
CVE-2021-34444
CVE-2021-33781
CVE-2021-34491
CVE-2021-34504
CVE-2021-34456
CVE-2021-33774
CVE-2021-34513
CVE-2021-33788
CVE-2021-33771
CVE-2021-34494
CVE-2021-34503
CVE-2021-34446
CVE-2021-33760
CVE-2021-31183
CVE-2021-34510
CVE-2021-34493
CVE-2021-33761
CVE-2021-34459
CVE-2021-33744
CVE-2021-33755
CVE-2021-33745
CVE-2021-34440
CVE-2021-33749
CVE-2021-33764
CVE-2021-33743
CVE-2021-33757
CVE-2021-34489
CVE-2021-34441
CVE-2021-33784
CVE-2021-34525
CVE-2021-34507
CVE-2021-34516
CVE-2021-31947
CVE-2021-33780
CVE-2021-34476
CVE-2021-34511
CVE-2021-34458
CVE-2021-34500
CVE-2021-34512
CVE-2021-34496
CVE-2021-34460
CVE-2021-33783
CVE-2021-34492
CVE-2021-33763
CVE-2021-33785
CVE-2021-34442
CVE-2021-33765
CVE-2021-34450
CVE-2021-33786
CVE-2021-34461
CVE-2021-34462
CVE-2021-34466
CVE-2021-33754
CVE-2021-33752
CVE-2021-33750
CVE-2021-33776
CVE-2021-33759
CVE-2021-33779
CVE-2021-31979
CVE-2021-33756
CVE-2021-34509
CVE-2021-34508
CVE-2021-33751
CVE-2021-34449
CVE-2021-33777
CVE-2021-34448
CVE-2021-34499
CVE-2021-34438
CVE-2021-34457
CVE-2021-34445
CVE-2021-31961
CVE-2021-34455
CVE-2021-33772
CVE-2021-33746
CVE-2021-34498
CVE-2021-34447
CVE-2021-34521
CVE-2021-33778
CVE-2021-34439
CVE-2021-33740
CVE-2021-33782
CVE-2021-34514
CVE-2021-34454
CVE-2021-33773

Impacts:

ACE

Related products:

Microsoft Windows

CVE-IDS:

CVE-2021-337587.7Critical
CVE-2021-344976.8High
CVE-2021-344887.8Critical
CVE-2021-337757.8Critical
CVE-2021-344907.5Critical
CVE-2021-344446.5High
CVE-2021-337818.1Critical
CVE-2021-344915.5High
CVE-2021-345047.8Critical
CVE-2021-344567.8Critical
CVE-2021-337747.0High
CVE-2021-345137.8Critical
CVE-2021-337887.5Critical
CVE-2021-337717.8Critical
CVE-2021-344948.8Critical
CVE-2021-345037.8Critical
CVE-2021-344468.0Critical
CVE-2021-337605.5High
CVE-2021-311837.5Critical
CVE-2021-345107.8Critical
CVE-2021-344936.7High
CVE-2021-337617.8Critical
CVE-2021-344597.8Critical
CVE-2021-337445.3High
CVE-2021-337556.3High
CVE-2021-337456.5High
CVE-2021-344405.5High
CVE-2021-337498.8Critical
CVE-2021-337645.9High
CVE-2021-337437.8Critical
CVE-2021-337575.3High
CVE-2021-344897.8Critical
CVE-2021-344417.8Critical
CVE-2021-337847.8Critical
CVE-2021-345258.8Critical
CVE-2021-345076.5High
CVE-2021-345167.8Critical
CVE-2021-319477.8Critical
CVE-2021-337808.8Critical
CVE-2021-344767.5Critical
CVE-2021-345117.8Critical
CVE-2021-344589.9Critical
CVE-2021-345006.3High
CVE-2021-345127.8Critical
CVE-2021-344965.5High
CVE-2021-344607.8Critical
CVE-2021-337836.5High
CVE-2021-344928.1Critical
CVE-2021-337635.5High
CVE-2021-337857.5Critical
CVE-2021-344428.8Critical
CVE-2021-337656.2High
CVE-2021-344508.5Critical
CVE-2021-337868.1Critical
CVE-2021-344617.8Critical
CVE-2021-344627.0High
CVE-2021-344665.7High
CVE-2021-337548.0Critical
CVE-2021-337528.8Critical
CVE-2021-337508.8Critical
CVE-2021-337767.8Critical
CVE-2021-337597.8Critical
CVE-2021-337798.1Critical
CVE-2021-319797.8Critical
CVE-2021-337568.8Critical
CVE-2021-345095.5High
CVE-2021-345088.8Critical
CVE-2021-337517.0High
CVE-2021-344497.0High
CVE-2021-337777.8Critical
CVE-2021-344486.8High
CVE-2021-344996.5High
CVE-2021-344387.8Critical
CVE-2021-344575.5High
CVE-2021-344457.8Critical
CVE-2021-319616.1High
CVE-2021-344557.8Critical
CVE-2021-337727.5Critical
CVE-2021-337468.0Critical
CVE-2021-344987.8Critical
CVE-2021-344476.8High
CVE-2021-345217.8Critical
CVE-2021-337787.8Critical
CVE-2021-344397.8Critical
CVE-2021-337407.8Critical
CVE-2021-337825.5High
CVE-2021-345147.8Critical
CVE-2021-344545.5High
CVE-2021-337737.8Critical

KB list:

5004238
5004302
5004294
5004237
5004244
5004298
5004285
5004249
5004245
5005563
5006674
5006669
5010419
5010395
5010358
5010359
5010392
5010412

Microsoft official advisories:

References

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.958 High

EPSS

Percentile

99.4%