logo
DATABASE RESOURCES PRICING ABOUT US

KLA12250 Multiple vulnerabilities in Microsoft Products (ESU)

Description

### *Detect date*: 08/10/2021 ### *Severity*: Critical ### *Description*: Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface, cause denial of service. ### *Exploitation*: Malware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>). ### *Affected products*: Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows 8.1 for 32-bit systems Windows Server 2016 (Server Core installation) Windows 10 Version 1909 for ARM64-based Systems Windows Server 2019 (Server Core installation) Windows 10 Version 1809 for 32-bit Systems Windows 10 for x64-based Systems Windows Server 2012 (Server Core installation) Windows 7 for 32-bit Systems Service Pack 1 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows Server 2019 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows 10 Version 1607 for x64-based Systems Windows Server 2008 for x64-based Systems Service Pack 2 Windows 10 Version 1809 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 20H2 for 32-bit Systems Windows Server, version 20H2 (Server Core Installation) Windows Server 2012 R2 Windows 10 Version 2004 for x64-based Systems Windows 10 Version 21H1 for 32-bit Systems Windows Server 2016 Windows RT 8.1 Windows 10 Version 21H1 for ARM64-based Systems Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows 10 Version 20H2 for ARM64-based Systems Windows Server 2012 Windows 8.1 for x64-based systems Remote Desktop client for Windows Desktop Windows 7 for x64-based Systems Service Pack 1 Windows 10 Version 1909 for x64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 21H1 for x64-based Systems Windows Server 2012 R2 (Server Core installation) Windows Server, version 2004 (Server Core installation) ### *Solution*: Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) ### *Original advisories*: [CVE-2021-34533](<https://nvd.nist.gov/vuln/detail/CVE-2021-34533>) [CVE-2021-26424](<https://nvd.nist.gov/vuln/detail/CVE-2021-26424>) [CVE-2021-34537](<https://nvd.nist.gov/vuln/detail/CVE-2021-34537>) [CVE-2021-26425](<https://nvd.nist.gov/vuln/detail/CVE-2021-26425>) [CVE-2021-36936](<https://nvd.nist.gov/vuln/detail/CVE-2021-36936>) [CVE-2021-34483](<https://nvd.nist.gov/vuln/detail/CVE-2021-34483>) [CVE-2021-36937](<https://nvd.nist.gov/vuln/detail/CVE-2021-36937>) [CVE-2021-36942](<https://nvd.nist.gov/vuln/detail/CVE-2021-36942>) [CVE-2021-36947](<https://nvd.nist.gov/vuln/detail/CVE-2021-36947>) [CVE-2021-34484](<https://nvd.nist.gov/vuln/detail/CVE-2021-34484>) [CVE-2021-34535](<https://nvd.nist.gov/vuln/detail/CVE-2021-34535>) [CVE-2021-36927](<https://nvd.nist.gov/vuln/detail/CVE-2021-36927>) [CVE-2021-34480](<https://nvd.nist.gov/vuln/detail/CVE-2021-34480>) ### *Impacts*: ACE ### *Related products*: [Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>) ### *KB list*: [5005090](<http://support.microsoft.com/kb/5005090>) [5005089](<http://support.microsoft.com/kb/5005089>) [5005036](<http://support.microsoft.com/kb/5005036>) [5005095](<http://support.microsoft.com/kb/5005095>) [5005088](<http://support.microsoft.com/kb/5005088>) [5011525](<http://support.microsoft.com/kb/5011525>) [5011534](<http://support.microsoft.com/kb/5011534>) [5011552](<http://support.microsoft.com/kb/5011552>) [5011529](<http://support.microsoft.com/kb/5011529>) ### *Microsoft official advisories*:


Related