logo
DATABASE RESOURCES PRICING ABOUT US

KLA12259 Multiple vulnerabilities in Microsoft Windows

Description

### *Detect date*: 08/10/2021 ### *Severity*: Critical ### *Description*: Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface, cause denial of service, obtain sensitive information. ### *Exploitation*: Malware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>). ### *Affected products*: Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows 10 Version 1909 for ARM64-based Systems Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows 8.1 for 32-bit systems Windows Server 2019 (Server Core installation) Windows 10 Version 1809 for 32-bit Systems Windows Server 2016 (Server Core installation) Windows 10 for x64-based Systems Windows Server 2012 (Server Core installation) Windows 7 for 32-bit Systems Service Pack 1 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows 10 Version 2004 for ARM64-based Systems Windows 10 Version 1909 for 32-bit Systems Windows Server 2019 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows 10 Version 1607 for x64-based Systems Windows Server 2008 for x64-based Systems Service Pack 2 Windows 10 Version 1809 for x64-based Systems Windows 10 for 32-bit Systems Windows 10 Version 20H2 for 32-bit Systems Windows Server, version 20H2 (Server Core Installation) Windows 10 Version 2004 for x64-based Systems Windows Server 2012 R2 Windows 10 Version 21H1 for 32-bit Systems Windows Server 2016 Windows RT 8.1 Windows 10 Version 21H1 for ARM64-based Systems Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows 10 Version 20H2 for ARM64-based Systems Windows Server 2012 Windows 8.1 for x64-based systems Remote Desktop client for Windows Desktop Windows 7 for x64-based Systems Service Pack 1 Windows 10 Version 1909 for x64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 21H1 for x64-based Systems Windows Server 2012 R2 (Server Core installation) Windows Server, version 2004 (Server Core installation) ### *Solution*: Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) ### *Original advisories*: [CVE-2021-36948](<https://nvd.nist.gov/vuln/detail/CVE-2021-36948>) [CVE-2021-26424](<https://nvd.nist.gov/vuln/detail/CVE-2021-26424>) [CVE-2021-26433](<https://nvd.nist.gov/vuln/detail/CVE-2021-26433>) [CVE-2021-36945](<https://nvd.nist.gov/vuln/detail/CVE-2021-36945>) [CVE-2021-26432](<https://nvd.nist.gov/vuln/detail/CVE-2021-26432>) [CVE-2021-36926](<https://nvd.nist.gov/vuln/detail/CVE-2021-36926>) [CVE-2021-36942](<https://nvd.nist.gov/vuln/detail/CVE-2021-36942>) [CVE-2021-36947](<https://nvd.nist.gov/vuln/detail/CVE-2021-36947>) [CVE-2021-34487](<https://nvd.nist.gov/vuln/detail/CVE-2021-34487>) [CVE-2021-34530](<https://nvd.nist.gov/vuln/detail/CVE-2021-34530>) [CVE-2021-34480](<https://nvd.nist.gov/vuln/detail/CVE-2021-34480>) [CVE-2021-34534](<https://nvd.nist.gov/vuln/detail/CVE-2021-34534>) [CVE-2021-36927](<https://nvd.nist.gov/vuln/detail/CVE-2021-36927>) [CVE-2021-34486](<https://nvd.nist.gov/vuln/detail/CVE-2021-34486>) [CVE-2021-36932](<https://nvd.nist.gov/vuln/detail/CVE-2021-36932>) [CVE-2021-34533](<https://nvd.nist.gov/vuln/detail/CVE-2021-34533>) [CVE-2021-34537](<https://nvd.nist.gov/vuln/detail/CVE-2021-34537>) [CVE-2021-36937](<https://nvd.nist.gov/vuln/detail/CVE-2021-36937>) [CVE-2021-36936](<https://nvd.nist.gov/vuln/detail/CVE-2021-36936>) [CVE-2021-26425](<https://nvd.nist.gov/vuln/detail/CVE-2021-26425>) [CVE-2021-34483](<https://nvd.nist.gov/vuln/detail/CVE-2021-34483>) [CVE-2021-26431](<https://nvd.nist.gov/vuln/detail/CVE-2021-26431>) [CVE-2021-26426](<https://nvd.nist.gov/vuln/detail/CVE-2021-26426>) [CVE-2021-34536](<https://nvd.nist.gov/vuln/detail/CVE-2021-34536>) [CVE-2021-34484](<https://nvd.nist.gov/vuln/detail/CVE-2021-34484>) [CVE-2021-34535](<https://nvd.nist.gov/vuln/detail/CVE-2021-34535>) [CVE-2021-36933](<https://nvd.nist.gov/vuln/detail/CVE-2021-36933>) [CVE-2021-36938](<https://nvd.nist.gov/vuln/detail/CVE-2021-36938>) ### *Impacts*: ACE ### *Related products*: [Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>) ### *KB list*: [4023814](<http://support.microsoft.com/kb/4023814>) [5005036](<http://support.microsoft.com/kb/5005036>) [5005031](<http://support.microsoft.com/kb/5005031>) [5005033](<http://support.microsoft.com/kb/5005033>) [5005030](<http://support.microsoft.com/kb/5005030>) [5005106](<http://support.microsoft.com/kb/5005106>) [5005040](<http://support.microsoft.com/kb/5005040>) [5005099](<http://support.microsoft.com/kb/5005099>) [5005043](<http://support.microsoft.com/kb/5005043>) [5005076](<http://support.microsoft.com/kb/5005076>) [5005094](<http://support.microsoft.com/kb/5005094>) [5011535](<http://support.microsoft.com/kb/5011535>) [5011564](<http://support.microsoft.com/kb/5011564>) [5011560](<http://support.microsoft.com/kb/5011560>) [5011527](<http://support.microsoft.com/kb/5011527>) ### *Microsoft official advisories*:


Related