Description
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33773, CVE-2021-34445, CVE-2021-34456.
Related
{"id": "MS:CVE-2021-33761", "bulletinFamily": "microsoft", "title": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability", "description": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33773, CVE-2021-34445, CVE-2021-34456.", "published": "2021-07-13T07:00:00", "modified": "2021-07-13T07:00:00", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-33761", "reporter": "Microsoft", "references": [], "cvelist": ["CVE-2021-33773", "CVE-2021-33761", "CVE-2021-34445", "CVE-2021-34456"], "immutableFields": [], "type": "mscve", "lastseen": "2022-10-03T16:26:16", "edition": 1, "viewCount": 7, "enchantments": {"backreferences": {"references": [{"idList": ["CISA:574A6E25827684C587359C37EF1D5132"], "type": "cisa"}, {"idList": ["RAPID7BLOG:4B35B23167A9D5E016537F6A81E4E9D4"], "type": "rapid7blog"}, {"idList": ["SMB_NT_MS21_JUL_5004237.NASL"], "type": "nessus"}, {"idList": ["KLA12221"], "type": "kaspersky"}, {"idList": ["CVE-2021-33773", "CVE-2021-33761", "CVE-2021-34445", "CVE-2021-34456"], "type": "cve"}, {"idList": ["THREATPOST:2C2827FBF9D900F4194802CE8C471B4C"], "type": "threatpost"}, {"idList": ["KB5004945", "KB5004249"], "type": "mskb"}]}, "dependencies": {"references": [{"idList": ["RAPID7BLOG:4B35B23167A9D5E016537F6A81E4E9D4"], "type": "rapid7blog"}, {"idList": ["SMB_NT_MS21_JUL_5004237.NASL", "SMB_NT_MS21_JUL_5004298.NASL", "SMB_NT_MS21_JUL_5004245.NASL", "SMB_NT_MS21_JUL_5004244.NASL", "SMB_NT_MS21_JUL_5004238.NASL", "SMB_NT_MS21_JUL_5004249.NASL", "SMB_NT_MS21_JUL_5004307.NASL", "SMB_NT_MS21_JUL_5004294.NASL"], "type": "nessus"}, {"idList": ["CVE-2021-33773", "CVE-2021-33761", "CVE-2021-34445", "CVE-2021-34456"], "type": "cve"}, {"idList": ["KLA12221", "KLA12226"], "type": "kaspersky"}, {"idList": ["MS:CVE-2021-34445", "MS:CVE-2021-33773", "MS:CVE-2021-34456"], "type": "mscve"}]}, "exploitation": null, "score": {"value": 5.0, "vector": "NONE"}, "vulnersScore": 5.0}, "_state": {"dependencies": 1664814947, "score": 1664815070}, "_internal": {"score_hash": "60ebdd20423db46cffb153ebc8366478"}, "kbList": ["KB5004947", "KB5004237", "KB5004950", "KB5004238", "KB5004298", "KB5004946", "KB5004945", "KB5004244", "KB5004948", "KB5004249", "KB5004245", "KB5004285", "KB5004954"], "msrc": "", "mscve": "CVE-2021-33761", "msAffectedSoftware": [{"kb": "KB5004298", "kbSupersedence": "KB5004954", "msplatform": "", "name": "windows server 2012 r2", "operator": "lt", "version": "6.3.9600.20069"}, {"kb": "KB5004237", "kbSupersedence": "KB5004945", "msplatform": "", "name": "windows 10 version 21h1 for 32-bit systems", "operator": "lt", "version": "10.0.19043.1110"}, {"kb": "KB5004285", "kbSupersedence": "", "msplatform": "", "name": "windows 8.1 for x64-based systems", "operator": "lt", "version": "6.3.9600.20069"}, {"kb": "KB5004237", "kbSupersedence": "KB5004945", "msplatform": "", "name": "windows 10 version 20h2 for 32-bit systems", "operator": "lt", "version": "10.0.19042.1110"}, {"kb": "KB5004249", "kbSupersedence": "KB5004950", "msplatform": "", "name": "windows 10 for 32-bit systems", "operator": "lt", "version": "10.0.10240.19003"}, {"kb": "KB5004237", "kbSupersedence": "KB5004945", "msplatform": "", "name": "windows 10 version 20h2 for arm64-based systems", "operator": "lt", "version": "10.0.19042.1110"}, {"kb": "KB5004285", "kbSupersedence": "", "msplatform": "", "name": "windows server 2012 r2 (server core installation)", "operator": "lt", "version": "6.3.9600.20069"}, {"kb": "KB5004238", "kbSupersedence": "KB5004948", "msplatform": "", "name": "windows 10 version 1607 for x64-based systems", "operator": "lt", "version": "10.0.14393.4530"}, {"kb": "KB5004237", "kbSupersedence": "KB5004945", "msplatform": "", "name": "windows server, version 2004 (server core installation)", "operator": "lt", "version": "10.0.19041.1110"}, {"kb": "KB5004244", "kbSupersedence": "KB5004947", "msplatform": "", "name": "windows 10 version 1809 for arm64-based systems", "operator": "lt", "version": "10.0.17763.2061"}, {"kb": "KB5004237", "kbSupersedence": "KB5004945", "msplatform": "", "name": "windows 10 version 2004 for 32-bit systems", "operator": "lt", "version": "10.0.19041.1110"}, {"kb": "KB5004237", "kbSupersedence": "KB5004945", "msplatform": "", "name": "windows 10 version 2004 for arm64-based systems", "operator": "lt", "version": "10.0.19041.1110"}, {"kb": "KB5004237", "kbSupersedence": "KB5004945", "msplatform": "", "name": "windows 10 version 21h1 for arm64-based systems", "operator": "lt", "version": "10.0.19043.1110"}, {"kb": "KB5004285", "kbSupersedence": "", "msplatform": "", "name": "windows 8.1 for 32-bit systems", "operator": "lt", "version": "6.3.9600.20069"}, {"kb": "KB5004298", "kbSupersedence": "KB5004954", "msplatform": "", "name": "windows 8.1 for 32-bit systems", "operator": "lt", "version": "6.3.9600.20069"}, {"kb": "KB5004237", "kbSupersedence": "KB5004945", "msplatform": "", "name": "windows 10 version 2004 for x64-based systems", "operator": "lt", "version": "10.0.19041.1110"}, {"kb": "KB5004237", "kbSupersedence": "KB5004945", "msplatform": "", "name": "windows 10 version 21h1 for x64-based systems", "operator": "lt", "version": "10.0.19043.1110"}, {"kb": "KB5004244", "kbSupersedence": "KB5004947", "msplatform": "", "name": "windows 10 version 1809 for x64-based systems", "operator": "lt", "version": "10.0.17763.2061"}, {"kb": "KB5004238", "kbSupersedence": "KB5004948", "msplatform": "", "name": "windows server 2016 (server core installation)", "operator": "lt", "version": "10.0.14393.4530"}, {"kb": "KB5004245", "kbSupersedence": "KB5004946", "msplatform": "", "name": "windows 10 version 1909 for arm64-based systems", "operator": "lt", "version": "10.0.18363.1679"}, {"kb": "KB5004298", "kbSupersedence": "KB5004954", "msplatform": "", "name": "windows rt 8.1", "operator": "lt", "version": "6.3.9600.20069"}, {"kb": "KB5004244", "kbSupersedence": "KB5004947", "msplatform": "", "name": "windows 10 version 1809 for 32-bit systems", "operator": "lt", "version": "10.0.17763.2061"}, {"kb": "KB5004298", "kbSupersedence": "KB5004954", "msplatform": "", "name": "windows 8.1 for x64-based systems", "operator": "lt", "version": "6.3.9600.20069"}, {"kb": "KB5004298", "kbSupersedence": "KB5004954", "msplatform": "", "name": "windows server 2012 r2 (server core installation)", "operator": "lt", "version": "6.3.9600.20069"}, {"kb": "KB5004244", "kbSupersedence": "KB5004947", "msplatform": "", "name": "windows server 2019 (server core installation)", "operator": "lt", "version": "10.0.17763.2061"}, {"kb": "KB5004238", "kbSupersedence": "KB5004948", "msplatform": "", "name": "windows server 2016", "operator": "lt", "version": "10.0.14393.4530"}, {"kb": "KB5004237", "kbSupersedence": "KB5004945", "msplatform": "", "name": "windows server, version 20h2 (server core installation)", "operator": "lt", "version": "10.0.19042.1110"}, {"kb": "KB5004238", "kbSupersedence": "KB5004948", "msplatform": "", "name": "windows 10 version 1607 for 32-bit systems", "operator": "lt", "version": "10.0.14393.4530"}, {"kb": "KB5004237", "kbSupersedence": "KB5004945", "msplatform": "", "name": "windows 10 version 20h2 for x64-based systems", "operator": "lt", "version": "10.0.19042.1110"}, {"kb": "KB5004285", "kbSupersedence": "", "msplatform": "", "name": "windows server 2012 r2", "operator": "lt", "version": "6.3.9600.20069"}, {"kb": "KB5004245", "kbSupersedence": "KB5004946", "msplatform": "", "name": "windows 10 version 1909 for x64-based systems", "operator": "lt", "version": "10.0.18363.1679"}, {"kb": "KB5004249", "kbSupersedence": "KB5004950", "msplatform": "", "name": "windows 10 for x64-based systems", "operator": "lt", "version": "10.0.10240.19003"}, {"kb": "KB5004244", "kbSupersedence": "KB5004947", "msplatform": "", "name": "windows server 2019", "operator": "lt", "version": "10.0.17763.2061"}, {"kb": "KB5004245", "kbSupersedence": "KB5004946", "msplatform": "", "name": "windows 10 version 1909 for 32-bit systems", "operator": "lt", "version": "10.0.18363.1679"}], "vendorCvss": {"baseScore": "7.8", "temporalScore": "6.8", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"}}
{"mscve": [{"lastseen": "2022-10-26T06:15:42", "description": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33761, CVE-2021-33773, CVE-2021-34445.", "edition": 1, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T07:00:00", "type": "mscve", "title": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-33773", "CVE-2021-33761", "CVE-2021-34445", "CVE-2021-34456"], "modified": "2021-07-13T07:00:00", "id": "MS:CVE-2021-34456", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34456", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-10-03T16:26:15", "description": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33761, CVE-2021-34445, CVE-2021-34456.", "edition": 1, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T07:00:00", "type": "mscve", "title": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-33773", "CVE-2021-33761", "CVE-2021-34445", "CVE-2021-34456"], "modified": "2021-07-13T07:00:00", "id": "MS:CVE-2021-33773", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-33773", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-10-30T06:38:15", "description": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33761, CVE-2021-33773, CVE-2021-34456.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T07:00:00", "type": "mscve", "title": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-33761", "CVE-2021-33773", "CVE-2021-34445", "CVE-2021-34456"], "modified": "2021-07-13T07:00:00", "id": "MS:CVE-2021-34445", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34445", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2022-05-04T17:24:10", "description": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33773, CVE-2021-34445, CVE-2021-34456.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-14T18:15:00", "type": "cve", "title": "CVE-2021-33761", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-33761", "CVE-2021-33773", "CVE-2021-34445", "CVE-2021-34456"], "modified": "2022-05-03T16:04:00", "cpe": ["cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1607"], "id": "CVE-2021-33761", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33761", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"]}, {"lastseen": "2022-05-04T17:24:00", "description": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33761, CVE-2021-34445, CVE-2021-34456.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-14T18:15:00", "type": "cve", "title": "CVE-2021-33773", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-33761", "CVE-2021-33773", "CVE-2021-34445", "CVE-2021-34456"], "modified": "2022-05-03T16:04:00", "cpe": ["cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:1607"], "id": "CVE-2021-33773", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-33773", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"]}, {"lastseen": "2022-05-04T17:23:09", "description": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33761, CVE-2021-33773, CVE-2021-34456.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-16T21:15:00", "type": "cve", "title": "CVE-2021-34445", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-33761", "CVE-2021-33773", "CVE-2021-34445", "CVE-2021-34456"], "modified": "2022-05-03T16:04:00", "cpe": ["cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_10:1809"], "id": "CVE-2021-34445", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-34445", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T18:42:23", "description": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33761, CVE-2021-33773, CVE-2021-34445.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-16T21:15:00", "type": "cve", "title": "CVE-2021-34456", "cwe": ["CWE-269"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-33761", "CVE-2021-33773", "CVE-2021-34445", "CVE-2021-34456"], "modified": "2021-07-22T17:04:00", "cpe": ["cpe:/o:microsoft:windows_8.1:-", "cpe:/o:microsoft:windows_10:21h1", "cpe:/o:microsoft:windows_10:1809", "cpe:/o:microsoft:windows_10:20h2", "cpe:/o:microsoft:windows_server_2019:-", "cpe:/o:microsoft:windows_10:1909", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_10:2004", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_server_2016:2004", "cpe:/o:microsoft:windows_server_2016:20h2", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_rt_8.1:-", "cpe:/o:microsoft:windows_server_2016:-", "cpe:/o:microsoft:windows_7:-", "cpe:/o:microsoft:windows_10:1607"], "id": "CVE-2021-34456", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-34456", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*"]}], "cnvd": [{"lastseen": "2022-11-05T09:54:08", "description": "Microsoft Windows and Microsoft Windows Server are both products of Microsoft Corporation, an operating system for personal devices, and Microsoft Windows Server is a server operating system. An elevation-of-privilege vulnerability exists in the Remote Access Connection Manager in Microsoft Windows/Windows Server. No details of the vulnerability are currently available.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-16T00:00:00", "type": "cnvd", "title": "Microsoft Windows/Windows Server Elevation of Privilege Vulnerability (CNVD-2021-66078)", "bulletinFamily": "cnvd", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-34445"], "modified": "2021-08-29T00:00:00", "id": "CNVD-2021-66078", "href": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-66078", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-11-05T09:53:58", "description": "Microsoft Windows and Microsoft Windows Server are both products of Microsoft Corporation, an operating system for personal devices, and Microsoft Windows Server is a server operating system. An elevation-of-privilege vulnerability exists in the Remote Access Connection Manager in Microsoft Windows/Windows Server. No details of the vulnerability are available.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-16T00:00:00", "type": "cnvd", "title": "Microsoft Windows/Windows Server Elevation of Privilege Vulnerability (CNVD-2021-66080)", "bulletinFamily": "cnvd", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-33761"], "modified": "2021-08-29T00:00:00", "id": "CNVD-2021-66080", "href": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-66080", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-11-05T09:54:07", "description": "Microsoft Windows and Microsoft Windows Server are both products of Microsoft Corporation, an operating system for personal devices, and Microsoft Windows Server is a server operating system. An elevation-of-privilege vulnerability exists in the Remote Access Connection Manager in Microsoft Windows/Windows Server. No details of the vulnerability are available.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-16T00:00:00", "type": "cnvd", "title": "Microsoft Windows/Windows Server Elevation of Privilege Vulnerability (CNVD-2021-66079)", "bulletinFamily": "cnvd", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-33773"], "modified": "2021-08-29T00:00:00", "id": "CNVD-2021-66079", "href": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-66079", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-11-05T09:54:14", "description": "Microsoft Windows and Microsoft Windows Server are both products of Microsoft Corporation, an operating system for personal devices, and Microsoft Windows Server is a server operating system. An elevation-of-privilege vulnerability exists in the Remote Access Connection Manager in Microsoft Windows/Windows Server. No details of the vulnerability are currently available.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-16T00:00:00", "type": "cnvd", "title": "Microsoft Windows/Windows Server Elevation of Privilege Vulnerability (CNVD-2021-66077)", "bulletinFamily": "cnvd", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 4.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-34456"], "modified": "2021-08-29T00:00:00", "id": "CNVD-2021-66077", "href": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-66077", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2023-01-11T14:52:50", "description": "The remote Windows host is missing security update 5004249. It is, therefore, affected by multiple vulnerabilities.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T00:00:00", "type": "nessus", "title": "KB5004249: Windows 10 1507 LTS Security Update (July 2021)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31183", "CVE-2021-31979", "CVE-2021-33740", "CVE-2021-33749", "CVE-2021-33750", "CVE-2021-33752", "CVE-2021-33756", "CVE-2021-33757", "CVE-2021-33761", "CVE-2021-33763", "CVE-2021-33765", "CVE-2021-33771", "CVE-2021-33773", "CVE-2021-33782", "CVE-2021-33783", "CVE-2021-33788", "CVE-2021-34439", "CVE-2021-34440", "CVE-2021-34441", "CVE-2021-34446", "CVE-2021-34447", "CVE-2021-34448", "CVE-2021-34454", "CVE-2021-34455", "CVE-2021-34456", "CVE-2021-34457", "CVE-2021-34459", "CVE-2021-34462", "CVE-2021-34476", "CVE-2021-34491", "CVE-2021-34492", "CVE-2021-34493", "CVE-2021-34496", "CVE-2021-34497", "CVE-2021-34498", "CVE-2021-34500", "CVE-2021-34504", "CVE-2021-34507", "CVE-2021-34511", "CVE-2021-34512", "CVE-2021-34514", "CVE-2021-34516"], "modified": "2022-05-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_JUL_5004249.NASL", "href": "https://www.tenable.com/plugins/nessus/151596", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151596);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/09\");\n\n script_cve_id(\n \"CVE-2021-31183\",\n \"CVE-2021-31979\",\n \"CVE-2021-33740\",\n \"CVE-2021-33749\",\n \"CVE-2021-33750\",\n \"CVE-2021-33752\",\n \"CVE-2021-33756\",\n \"CVE-2021-33757\",\n \"CVE-2021-33761\",\n \"CVE-2021-33763\",\n \"CVE-2021-33765\",\n \"CVE-2021-33771\",\n \"CVE-2021-33773\",\n \"CVE-2021-33782\",\n \"CVE-2021-33783\",\n \"CVE-2021-33788\",\n \"CVE-2021-34439\",\n \"CVE-2021-34440\",\n \"CVE-2021-34441\",\n \"CVE-2021-34446\",\n \"CVE-2021-34447\",\n \"CVE-2021-34448\",\n \"CVE-2021-34454\",\n \"CVE-2021-34455\",\n \"CVE-2021-34456\",\n \"CVE-2021-34457\",\n \"CVE-2021-34459\",\n \"CVE-2021-34462\",\n \"CVE-2021-34476\",\n \"CVE-2021-34491\",\n \"CVE-2021-34492\",\n \"CVE-2021-34493\",\n \"CVE-2021-34496\",\n \"CVE-2021-34497\",\n \"CVE-2021-34498\",\n \"CVE-2021-34500\",\n \"CVE-2021-34504\",\n \"CVE-2021-34507\",\n \"CVE-2021-34511\",\n \"CVE-2021-34512\",\n \"CVE-2021-34514\",\n \"CVE-2021-34516\"\n );\n script_xref(name:\"MSKB\", value:\"5004249\");\n script_xref(name:\"MSFT\", value:\"MS21-5004249\");\n script_xref(name:\"IAVA\", value:\"2021-A-0319-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0318-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"KB5004249: Windows 10 1507 LTS Security Update (July 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5004249. It is, therefore, affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update 5004249\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-34448\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-33757\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-07';\nkbs = make_list(\n '5004249'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10', \n os_build:10240,\n rollup_date:'07_2021',\n bulletin:bulletin,\n rollup_kb_list:[5004249])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T14:52:09", "description": "The remote Windows host is missing security update 5004245. It is, therefore, affected by multiple vulnerabilities.", "cvss3": {"exploitabilityScore": 3.1, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 9.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2021-07-13T00:00:00", "type": "nessus", "title": "KB5004245: Windows 10 1909 Security Update (July 2021)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31183", "CVE-2021-31961", "CVE-2021-31979", "CVE-2021-33743", "CVE-2021-33744", "CVE-2021-33749", "CVE-2021-33750", "CVE-2021-33751", "CVE-2021-33752", "CVE-2021-33755", "CVE-2021-33756", "CVE-2021-33757", "CVE-2021-33759", "CVE-2021-33760", "CVE-2021-33761", "CVE-2021-33763", "CVE-2021-33765", "CVE-2021-33771", "CVE-2021-33773", "CVE-2021-33774", "CVE-2021-33781", "CVE-2021-33782", "CVE-2021-33783", "CVE-2021-33784", "CVE-2021-33785", "CVE-2021-33788", "CVE-2021-34438", "CVE-2021-34440", "CVE-2021-34441", "CVE-2021-34445", "CVE-2021-34446", "CVE-2021-34447", "CVE-2021-34448", "CVE-2021-34449", "CVE-2021-34450", "CVE-2021-34454", "CVE-2021-34455", "CVE-2021-34456", "CVE-2021-34457", "CVE-2021-34459", "CVE-2021-34460", "CVE-2021-34462", "CVE-2021-34466", "CVE-2021-34476", "CVE-2021-34488", "CVE-2021-34489", "CVE-2021-34490", "CVE-2021-34491", "CVE-2021-34492", "CVE-2021-34493", "CVE-2021-34496", "CVE-2021-34497", "CVE-2021-34498", "CVE-2021-34500", "CVE-2021-34503", "CVE-2021-34504", "CVE-2021-34507", "CVE-2021-34508", "CVE-2021-34509", "CVE-2021-34510", "CVE-2021-34511", "CVE-2021-34512", "CVE-2021-34513", "CVE-2021-34514", "CVE-2021-34516", "CVE-2021-34521"], "modified": "2022-05-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_JUL_5004245.NASL", "href": "https://www.tenable.com/plugins/nessus/151604", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151604);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/09\");\n\n script_cve_id(\n \"CVE-2021-31183\",\n \"CVE-2021-31961\",\n \"CVE-2021-31979\",\n \"CVE-2021-33743\",\n \"CVE-2021-33744\",\n \"CVE-2021-33749\",\n \"CVE-2021-33750\",\n \"CVE-2021-33751\",\n \"CVE-2021-33752\",\n \"CVE-2021-33755\",\n \"CVE-2021-33756\",\n \"CVE-2021-33757\",\n \"CVE-2021-33759\",\n \"CVE-2021-33760\",\n \"CVE-2021-33761\",\n \"CVE-2021-33763\",\n \"CVE-2021-33765\",\n \"CVE-2021-33771\",\n \"CVE-2021-33773\",\n \"CVE-2021-33774\",\n \"CVE-2021-33781\",\n \"CVE-2021-33782\",\n \"CVE-2021-33783\",\n \"CVE-2021-33784\",\n \"CVE-2021-33785\",\n \"CVE-2021-33788\",\n \"CVE-2021-34438\",\n \"CVE-2021-34440\",\n \"CVE-2021-34441\",\n \"CVE-2021-34445\",\n \"CVE-2021-34446\",\n \"CVE-2021-34447\",\n \"CVE-2021-34448\",\n \"CVE-2021-34449\",\n \"CVE-2021-34450\",\n \"CVE-2021-34454\",\n \"CVE-2021-34455\",\n \"CVE-2021-34456\",\n \"CVE-2021-34457\",\n \"CVE-2021-34459\",\n \"CVE-2021-34460\",\n \"CVE-2021-34462\",\n \"CVE-2021-34466\",\n \"CVE-2021-34476\",\n \"CVE-2021-34488\",\n \"CVE-2021-34489\",\n \"CVE-2021-34490\",\n \"CVE-2021-34491\",\n \"CVE-2021-34492\",\n \"CVE-2021-34493\",\n \"CVE-2021-34496\",\n \"CVE-2021-34497\",\n \"CVE-2021-34498\",\n \"CVE-2021-34500\",\n \"CVE-2021-34503\",\n \"CVE-2021-34504\",\n \"CVE-2021-34507\",\n \"CVE-2021-34508\",\n \"CVE-2021-34509\",\n \"CVE-2021-34510\",\n \"CVE-2021-34511\",\n \"CVE-2021-34512\",\n \"CVE-2021-34513\",\n \"CVE-2021-34514\",\n \"CVE-2021-34516\",\n \"CVE-2021-34521\"\n );\n script_xref(name:\"MSKB\", value:\"5004245\");\n script_xref(name:\"MSFT\", value:\"MS21-5004245\");\n script_xref(name:\"IAVA\", value:\"2021-A-0319-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0318-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"KB5004245: Windows 10 1909 Security Update (July 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5004245. It is, therefore, affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update 5004245\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-34448\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-34450\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-07';\nkbs = make_list(\n '5004245'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10', \n os_build:18363,\n rollup_date:'07_2021',\n bulletin:bulletin,\n rollup_kb_list:[5004245])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T14:51:34", "description": "The remote Windows host is missing security update 5004298. It is, therefore, affected by multiple vulnerabilities.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T00:00:00", "type": "nessus", "title": "KB5004298: Windows Server 2012 R2 Security Update (July 2021)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31183", "CVE-2021-31979", "CVE-2021-33745", "CVE-2021-33746", "CVE-2021-33749", "CVE-2021-33750", "CVE-2021-33752", "CVE-2021-33754", "CVE-2021-33756", "CVE-2021-33757", "CVE-2021-33761", "CVE-2021-33763", "CVE-2021-33764", "CVE-2021-33765", "CVE-2021-33771", "CVE-2021-33773", "CVE-2021-33780", "CVE-2021-33782", "CVE-2021-33783", "CVE-2021-33786", "CVE-2021-33788", "CVE-2021-34440", "CVE-2021-34441", "CVE-2021-34442", "CVE-2021-34444", "CVE-2021-34446", "CVE-2021-34447", "CVE-2021-34448", "CVE-2021-34454", "CVE-2021-34455", "CVE-2021-34456", "CVE-2021-34457", "CVE-2021-34459", "CVE-2021-34460", "CVE-2021-34476", "CVE-2021-34491", "CVE-2021-34492", "CVE-2021-34494", "CVE-2021-34496", "CVE-2021-34497", "CVE-2021-34498", "CVE-2021-34499", "CVE-2021-34500", "CVE-2021-34504", "CVE-2021-34507", "CVE-2021-34511", "CVE-2021-34514", "CVE-2021-34516", "CVE-2021-34525"], "modified": "2022-05-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_JUL_5004298.NASL", "href": "https://www.tenable.com/plugins/nessus/151598", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151598);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/09\");\n\n script_cve_id(\n \"CVE-2021-31183\",\n \"CVE-2021-31979\",\n \"CVE-2021-33745\",\n \"CVE-2021-33746\",\n \"CVE-2021-33749\",\n \"CVE-2021-33750\",\n \"CVE-2021-33752\",\n \"CVE-2021-33754\",\n \"CVE-2021-33756\",\n \"CVE-2021-33757\",\n \"CVE-2021-33761\",\n \"CVE-2021-33763\",\n \"CVE-2021-33764\",\n \"CVE-2021-33765\",\n \"CVE-2021-33771\",\n \"CVE-2021-33773\",\n \"CVE-2021-33780\",\n \"CVE-2021-33782\",\n \"CVE-2021-33783\",\n \"CVE-2021-33786\",\n \"CVE-2021-33788\",\n \"CVE-2021-34440\",\n \"CVE-2021-34441\",\n \"CVE-2021-34442\",\n \"CVE-2021-34444\",\n \"CVE-2021-34446\",\n \"CVE-2021-34447\",\n \"CVE-2021-34448\",\n \"CVE-2021-34454\",\n \"CVE-2021-34455\",\n \"CVE-2021-34456\",\n \"CVE-2021-34457\",\n \"CVE-2021-34459\",\n \"CVE-2021-34460\",\n \"CVE-2021-34476\",\n \"CVE-2021-34491\",\n \"CVE-2021-34492\",\n \"CVE-2021-34494\",\n \"CVE-2021-34496\",\n \"CVE-2021-34497\",\n \"CVE-2021-34498\",\n \"CVE-2021-34499\",\n \"CVE-2021-34500\",\n \"CVE-2021-34504\",\n \"CVE-2021-34507\",\n \"CVE-2021-34511\",\n \"CVE-2021-34514\",\n \"CVE-2021-34516\",\n \"CVE-2021-34525\"\n );\n script_xref(name:\"MSKB\", value:\"5004298\");\n script_xref(name:\"MSKB\", value:\"5004285\");\n script_xref(name:\"MSFT\", value:\"MS21-5004298\");\n script_xref(name:\"MSFT\", value:\"MS21-5004285\");\n script_xref(name:\"IAVA\", value:\"2021-A-0319-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0318-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"KB5004298: Windows Server 2012 R2 Security Update (July 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5004298. It is, therefore, affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update 5004298\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-34448\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-33757\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-07';\nkbs = make_list(\n '5004298',\n '5004285'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.3', \n sp:0,\n rollup_date:'07_2021',\n bulletin:bulletin,\n rollup_kb_list:[5004298, 5004285])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T14:52:10", "description": "The remote Windows host is missing security update 5004244. It is, therefore, affected by multiple vulnerabilities.", "cvss3": {"exploitabilityScore": 3.1, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 9.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2021-07-13T00:00:00", "type": "nessus", "title": "KB5004244: Windows 10 version 1809 / Windows Server 2019 Security Update (July 2021)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31183", "CVE-2021-31961", "CVE-2021-31979", "CVE-2021-33740", "CVE-2021-33743", "CVE-2021-33744", "CVE-2021-33745", "CVE-2021-33746", "CVE-2021-33749", "CVE-2021-33750", "CVE-2021-33751", "CVE-2021-33752", "CVE-2021-33754", "CVE-2021-33755", "CVE-2021-33756", "CVE-2021-33757", "CVE-2021-33759", "CVE-2021-33761", "CVE-2021-33763", "CVE-2021-33764", "CVE-2021-33765", "CVE-2021-33771", "CVE-2021-33773", "CVE-2021-33774", "CVE-2021-33779", "CVE-2021-33780", "CVE-2021-33781", "CVE-2021-33782", "CVE-2021-33783", "CVE-2021-33784", "CVE-2021-33785", "CVE-2021-33786", "CVE-2021-33788", "CVE-2021-34438", "CVE-2021-34440", "CVE-2021-34441", "CVE-2021-34442", "CVE-2021-34444", "CVE-2021-34445", "CVE-2021-34446", "CVE-2021-34447", "CVE-2021-34448", "CVE-2021-34449", "CVE-2021-34450", "CVE-2021-34454", "CVE-2021-34455", "CVE-2021-34456", "CVE-2021-34457", "CVE-2021-34458", "CVE-2021-34459", "CVE-2021-34460", "CVE-2021-34462", "CVE-2021-34466", "CVE-2021-34476", "CVE-2021-34488", "CVE-2021-34489", "CVE-2021-34490", "CVE-2021-34491", "CVE-2021-34492", "CVE-2021-34493", "CVE-2021-34494", "CVE-2021-34496", "CVE-2021-34497", "CVE-2021-34498", "CVE-2021-34499", "CVE-2021-34500", "CVE-2021-34503", "CVE-2021-34504", "CVE-2021-34507", "CVE-2021-34508", "CVE-2021-34509", "CVE-2021-34510", "CVE-2021-34511", "CVE-2021-34512", "CVE-2021-34514", "CVE-2021-34516", "CVE-2021-34525"], "modified": "2022-05-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_JUL_5004244.NASL", "href": "https://www.tenable.com/plugins/nessus/151588", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151588);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/09\");\n\n script_cve_id(\n \"CVE-2021-31183\",\n \"CVE-2021-31961\",\n \"CVE-2021-31979\",\n \"CVE-2021-33740\",\n \"CVE-2021-33743\",\n \"CVE-2021-33744\",\n \"CVE-2021-33745\",\n \"CVE-2021-33746\",\n \"CVE-2021-33749\",\n \"CVE-2021-33750\",\n \"CVE-2021-33751\",\n \"CVE-2021-33752\",\n \"CVE-2021-33754\",\n \"CVE-2021-33755\",\n \"CVE-2021-33756\",\n \"CVE-2021-33757\",\n \"CVE-2021-33759\",\n \"CVE-2021-33761\",\n \"CVE-2021-33763\",\n \"CVE-2021-33764\",\n \"CVE-2021-33765\",\n \"CVE-2021-33771\",\n \"CVE-2021-33773\",\n \"CVE-2021-33774\",\n \"CVE-2021-33779\",\n \"CVE-2021-33780\",\n \"CVE-2021-33781\",\n \"CVE-2021-33782\",\n \"CVE-2021-33783\",\n \"CVE-2021-33784\",\n \"CVE-2021-33785\",\n \"CVE-2021-33786\",\n \"CVE-2021-33788\",\n \"CVE-2021-34438\",\n \"CVE-2021-34440\",\n \"CVE-2021-34441\",\n \"CVE-2021-34442\",\n \"CVE-2021-34444\",\n \"CVE-2021-34445\",\n \"CVE-2021-34446\",\n \"CVE-2021-34447\",\n \"CVE-2021-34448\",\n \"CVE-2021-34449\",\n \"CVE-2021-34450\",\n \"CVE-2021-34454\",\n \"CVE-2021-34455\",\n \"CVE-2021-34456\",\n \"CVE-2021-34457\",\n \"CVE-2021-34458\",\n \"CVE-2021-34459\",\n \"CVE-2021-34460\",\n \"CVE-2021-34462\",\n \"CVE-2021-34466\",\n \"CVE-2021-34476\",\n \"CVE-2021-34488\",\n \"CVE-2021-34489\",\n \"CVE-2021-34490\",\n \"CVE-2021-34491\",\n \"CVE-2021-34492\",\n \"CVE-2021-34493\",\n \"CVE-2021-34494\",\n \"CVE-2021-34496\",\n \"CVE-2021-34497\",\n \"CVE-2021-34498\",\n \"CVE-2021-34499\",\n \"CVE-2021-34500\",\n \"CVE-2021-34503\",\n \"CVE-2021-34504\",\n \"CVE-2021-34507\",\n \"CVE-2021-34508\",\n \"CVE-2021-34509\",\n \"CVE-2021-34510\",\n \"CVE-2021-34511\",\n \"CVE-2021-34512\",\n \"CVE-2021-34514\",\n \"CVE-2021-34516\",\n \"CVE-2021-34525\"\n );\n script_xref(name:\"MSKB\", value:\"5004244\");\n script_xref(name:\"MSFT\", value:\"MS21-5004244\");\n script_xref(name:\"IAVA\", value:\"2021-A-0319-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0318-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"KB5004244: Windows 10 version 1809 / Windows Server 2019 Security Update (July 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5004244. It is, therefore, affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update 5004244\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-34448\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-34458\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-07';\nkbs = make_list(\n '5004244'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10', \n os_build:17763,\n rollup_date:'07_2021',\n bulletin:bulletin,\n rollup_kb_list:[5004244])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T14:52:11", "description": "The remote Windows host is missing security update 5004238. It is, therefore, affected by multiple vulnerabilities.", "cvss3": {"exploitabilityScore": 3.1, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 9.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2021-07-13T00:00:00", "type": "nessus", "title": "KB5004238: Windows 10 Version 1607 / Windows Server 2016 Security Update (July 2021)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31183", "CVE-2021-31979", "CVE-2021-33745", "CVE-2021-33746", "CVE-2021-33749", "CVE-2021-33750", "CVE-2021-33751", "CVE-2021-33752", "CVE-2021-33754", "CVE-2021-33756", "CVE-2021-33757", "CVE-2021-33758", "CVE-2021-33759", "CVE-2021-33761", "CVE-2021-33763", "CVE-2021-33764", "CVE-2021-33765", "CVE-2021-33771", "CVE-2021-33773", "CVE-2021-33779", "CVE-2021-33780", "CVE-2021-33782", "CVE-2021-33783", "CVE-2021-33786", "CVE-2021-33788", "CVE-2021-34439", "CVE-2021-34440", "CVE-2021-34441", "CVE-2021-34442", "CVE-2021-34444", "CVE-2021-34446", "CVE-2021-34447", "CVE-2021-34448", "CVE-2021-34454", "CVE-2021-34455", "CVE-2021-34456", "CVE-2021-34457", "CVE-2021-34458", "CVE-2021-34459", "CVE-2021-34460", "CVE-2021-34462", "CVE-2021-34476", "CVE-2021-34491", "CVE-2021-34492", "CVE-2021-34493", "CVE-2021-34494", "CVE-2021-34496", "CVE-2021-34497", "CVE-2021-34498", "CVE-2021-34499", "CVE-2021-34500", "CVE-2021-34504", "CVE-2021-34507", "CVE-2021-34509", "CVE-2021-34511", "CVE-2021-34512", "CVE-2021-34514", "CVE-2021-34516", "CVE-2021-34525"], "modified": "2022-05-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_JUL_5004238.NASL", "href": "https://www.tenable.com/plugins/nessus/151592", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151592);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/09\");\n\n script_cve_id(\n \"CVE-2021-31183\",\n \"CVE-2021-31979\",\n \"CVE-2021-33745\",\n \"CVE-2021-33746\",\n \"CVE-2021-33749\",\n \"CVE-2021-33750\",\n \"CVE-2021-33751\",\n \"CVE-2021-33752\",\n \"CVE-2021-33754\",\n \"CVE-2021-33756\",\n \"CVE-2021-33757\",\n \"CVE-2021-33758\",\n \"CVE-2021-33759\",\n \"CVE-2021-33761\",\n \"CVE-2021-33763\",\n \"CVE-2021-33764\",\n \"CVE-2021-33765\",\n \"CVE-2021-33771\",\n \"CVE-2021-33773\",\n \"CVE-2021-33779\",\n \"CVE-2021-33780\",\n \"CVE-2021-33782\",\n \"CVE-2021-33783\",\n \"CVE-2021-33786\",\n \"CVE-2021-33788\",\n \"CVE-2021-34439\",\n \"CVE-2021-34440\",\n \"CVE-2021-34441\",\n \"CVE-2021-34442\",\n \"CVE-2021-34444\",\n \"CVE-2021-34446\",\n \"CVE-2021-34447\",\n \"CVE-2021-34448\",\n \"CVE-2021-34454\",\n \"CVE-2021-34455\",\n \"CVE-2021-34456\",\n \"CVE-2021-34457\",\n \"CVE-2021-34458\",\n \"CVE-2021-34459\",\n \"CVE-2021-34460\",\n \"CVE-2021-34462\",\n \"CVE-2021-34476\",\n \"CVE-2021-34491\",\n \"CVE-2021-34492\",\n \"CVE-2021-34493\",\n \"CVE-2021-34494\",\n \"CVE-2021-34496\",\n \"CVE-2021-34497\",\n \"CVE-2021-34498\",\n \"CVE-2021-34499\",\n \"CVE-2021-34500\",\n \"CVE-2021-34504\",\n \"CVE-2021-34507\",\n \"CVE-2021-34509\",\n \"CVE-2021-34511\",\n \"CVE-2021-34512\",\n \"CVE-2021-34514\",\n \"CVE-2021-34516\",\n \"CVE-2021-34525\"\n );\n script_xref(name:\"MSKB\", value:\"5004238\");\n script_xref(name:\"MSFT\", value:\"MS21-5004238\");\n script_xref(name:\"IAVA\", value:\"2021-A-0319-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0318-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"KB5004238: Windows 10 Version 1607 / Windows Server 2016 Security Update (July 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5004238. It is, therefore, affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update 5004238\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-34448\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-34458\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-07';\nkbs = make_list(\n '5004238'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10', \n os_build:14393,\n rollup_date:'07_2021',\n bulletin:bulletin,\n rollup_kb_list:[5004238])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T14:51:53", "description": "The remote Windows host is missing security update 5004237. It is, therefore, affected by multiple vulnerabilities.", "cvss3": {"exploitabilityScore": 3.1, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 9.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2021-07-13T00:00:00", "type": "nessus", "title": "KB5004237: Windows 10 Version 2004 / Windows 10 Version 20H2 / Windows 10 Version 21H1 Security Update (July 2021)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31183", "CVE-2021-31961", "CVE-2021-31979", "CVE-2021-33740", "CVE-2021-33743", "CVE-2021-33744", "CVE-2021-33745", "CVE-2021-33746", "CVE-2021-33749", "CVE-2021-33750", "CVE-2021-33751", "CVE-2021-33752", "CVE-2021-33754", "CVE-2021-33755", "CVE-2021-33756", "CVE-2021-33757", "CVE-2021-33759", "CVE-2021-33760", "CVE-2021-33761", "CVE-2021-33763", "CVE-2021-33764", "CVE-2021-33765", "CVE-2021-33771", "CVE-2021-33772", "CVE-2021-33773", "CVE-2021-33774", "CVE-2021-33779", "CVE-2021-33780", "CVE-2021-33781", "CVE-2021-33782", "CVE-2021-33783", "CVE-2021-33784", "CVE-2021-33785", "CVE-2021-33786", "CVE-2021-33788", "CVE-2021-34438", "CVE-2021-34440", "CVE-2021-34441", "CVE-2021-34442", "CVE-2021-34444", "CVE-2021-34445", "CVE-2021-34446", "CVE-2021-34447", "CVE-2021-34448", "CVE-2021-34449", "CVE-2021-34450", "CVE-2021-34454", "CVE-2021-34455", "CVE-2021-34456", "CVE-2021-34457", "CVE-2021-34458", "CVE-2021-34459", "CVE-2021-34460", "CVE-2021-34461", "CVE-2021-34462", "CVE-2021-34466", "CVE-2021-34476", "CVE-2021-34488", "CVE-2021-34489", "CVE-2021-34490", "CVE-2021-34491", "CVE-2021-34492", "CVE-2021-34493", "CVE-2021-34494", "CVE-2021-34496", "CVE-2021-34497", "CVE-2021-34498", "CVE-2021-34499", "CVE-2021-34500", "CVE-2021-34504", "CVE-2021-34507", "CVE-2021-34508", "CVE-2021-34509", "CVE-2021-34510", "CVE-2021-34511", "CVE-2021-34512", "CVE-2021-34513", "CVE-2021-34514", "CVE-2021-34516", "CVE-2021-34521", "CVE-2021-34525"], "modified": "2022-05-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_JUL_5004237.NASL", "href": "https://www.tenable.com/plugins/nessus/151606", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151606);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/09\");\n\n script_cve_id(\n \"CVE-2021-31183\",\n \"CVE-2021-31961\",\n \"CVE-2021-31979\",\n \"CVE-2021-33740\",\n \"CVE-2021-33743\",\n \"CVE-2021-33744\",\n \"CVE-2021-33745\",\n \"CVE-2021-33746\",\n \"CVE-2021-33749\",\n \"CVE-2021-33750\",\n \"CVE-2021-33751\",\n \"CVE-2021-33752\",\n \"CVE-2021-33754\",\n \"CVE-2021-33755\",\n \"CVE-2021-33756\",\n \"CVE-2021-33757\",\n \"CVE-2021-33759\",\n \"CVE-2021-33760\",\n \"CVE-2021-33761\",\n \"CVE-2021-33763\",\n \"CVE-2021-33764\",\n \"CVE-2021-33765\",\n \"CVE-2021-33771\",\n \"CVE-2021-33772\",\n \"CVE-2021-33773\",\n \"CVE-2021-33774\",\n \"CVE-2021-33779\",\n \"CVE-2021-33780\",\n \"CVE-2021-33781\",\n \"CVE-2021-33782\",\n \"CVE-2021-33783\",\n \"CVE-2021-33784\",\n \"CVE-2021-33785\",\n \"CVE-2021-33786\",\n \"CVE-2021-33788\",\n \"CVE-2021-34438\",\n \"CVE-2021-34440\",\n \"CVE-2021-34441\",\n \"CVE-2021-34442\",\n \"CVE-2021-34444\",\n \"CVE-2021-34445\",\n \"CVE-2021-34446\",\n \"CVE-2021-34447\",\n \"CVE-2021-34448\",\n \"CVE-2021-34449\",\n \"CVE-2021-34450\",\n \"CVE-2021-34454\",\n \"CVE-2021-34455\",\n \"CVE-2021-34456\",\n \"CVE-2021-34457\",\n \"CVE-2021-34458\",\n \"CVE-2021-34459\",\n \"CVE-2021-34460\",\n \"CVE-2021-34461\",\n \"CVE-2021-34462\",\n \"CVE-2021-34466\",\n \"CVE-2021-34476\",\n \"CVE-2021-34488\",\n \"CVE-2021-34489\",\n \"CVE-2021-34490\",\n \"CVE-2021-34491\",\n \"CVE-2021-34492\",\n \"CVE-2021-34493\",\n \"CVE-2021-34494\",\n \"CVE-2021-34496\",\n \"CVE-2021-34497\",\n \"CVE-2021-34498\",\n \"CVE-2021-34499\",\n \"CVE-2021-34500\",\n \"CVE-2021-34504\",\n \"CVE-2021-34507\",\n \"CVE-2021-34508\",\n \"CVE-2021-34509\",\n \"CVE-2021-34510\",\n \"CVE-2021-34511\",\n \"CVE-2021-34512\",\n \"CVE-2021-34513\",\n \"CVE-2021-34514\",\n \"CVE-2021-34516\",\n \"CVE-2021-34521\",\n \"CVE-2021-34525\"\n );\n script_xref(name:\"MSKB\", value:\"5004237\");\n script_xref(name:\"MSFT\", value:\"MS21-5004237\");\n script_xref(name:\"IAVA\", value:\"2021-A-0319-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0318-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"KB5004237: Windows 10 Version 2004 / Windows 10 Version 20H2 / Windows 10 Version 21H1 Security Update (July 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5004237. It is, therefore, affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update 5004237\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-34448\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-34458\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-07';\nkbs = make_list(\n '5004237'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10', \n os_build:19041,\n rollup_date:'07_2021',\n bulletin:bulletin,\n rollup_kb_list:[5004237])\n||\nsmb_check_rollup(os:'10', \n os_build:19042,\n rollup_date:'07_2021',\n bulletin:bulletin,\n rollup_kb_list:[5004237])\n||\nsmb_check_rollup(os:'10', \n os_build:19043,\n rollup_date:'07_2021',\n bulletin:bulletin,\n rollup_kb_list:[5004237])\n\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T14:52:31", "description": "The remote Windows host is missing security update 5004307. It is, therefore, affected by multiple vulnerabilities.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T00:00:00", "type": "nessus", "title": "KB5004307: Windows 7 and Windows Server 2008 R2 Security Update (July 2021)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31183", "CVE-2021-31979", "CVE-2021-33745", "CVE-2021-33746", "CVE-2021-33749", "CVE-2021-33750", "CVE-2021-33752", "CVE-2021-33754", "CVE-2021-33756", "CVE-2021-33757", "CVE-2021-33764", "CVE-2021-33765", "CVE-2021-33780", "CVE-2021-33782", "CVE-2021-33783", "CVE-2021-33786", "CVE-2021-33788", "CVE-2021-34440", "CVE-2021-34441", "CVE-2021-34442", "CVE-2021-34444", "CVE-2021-34446", "CVE-2021-34447", "CVE-2021-34448", "CVE-2021-34456", "CVE-2021-34457", "CVE-2021-34476", "CVE-2021-34492", "CVE-2021-34494", "CVE-2021-34496", "CVE-2021-34497", "CVE-2021-34498", "CVE-2021-34499", "CVE-2021-34500", "CVE-2021-34504", "CVE-2021-34507", "CVE-2021-34511", "CVE-2021-34514", "CVE-2021-34516"], "modified": "2022-05-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_JUL_5004307.NASL", "href": "https://www.tenable.com/plugins/nessus/151611", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151611);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/09\");\n\n script_cve_id(\n \"CVE-2021-31183\",\n \"CVE-2021-31979\",\n \"CVE-2021-33745\",\n \"CVE-2021-33746\",\n \"CVE-2021-33749\",\n \"CVE-2021-33750\",\n \"CVE-2021-33752\",\n \"CVE-2021-33754\",\n \"CVE-2021-33756\",\n \"CVE-2021-33757\",\n \"CVE-2021-33764\",\n \"CVE-2021-33765\",\n \"CVE-2021-33780\",\n \"CVE-2021-33782\",\n \"CVE-2021-33783\",\n \"CVE-2021-33786\",\n \"CVE-2021-33788\",\n \"CVE-2021-34440\",\n \"CVE-2021-34441\",\n \"CVE-2021-34442\",\n \"CVE-2021-34444\",\n \"CVE-2021-34446\",\n \"CVE-2021-34447\",\n \"CVE-2021-34448\",\n \"CVE-2021-34456\",\n \"CVE-2021-34457\",\n \"CVE-2021-34476\",\n \"CVE-2021-34492\",\n \"CVE-2021-34494\",\n \"CVE-2021-34496\",\n \"CVE-2021-34497\",\n \"CVE-2021-34498\",\n \"CVE-2021-34499\",\n \"CVE-2021-34500\",\n \"CVE-2021-34504\",\n \"CVE-2021-34507\",\n \"CVE-2021-34511\",\n \"CVE-2021-34514\",\n \"CVE-2021-34516\"\n );\n script_xref(name:\"MSKB\", value:\"5004289\");\n script_xref(name:\"MSKB\", value:\"5004307\");\n script_xref(name:\"MSFT\", value:\"MS21-5004289\");\n script_xref(name:\"MSFT\", value:\"MS21-5004307\");\n script_xref(name:\"IAVA\", value:\"2021-A-0319-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0318-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"KB5004307: Windows 7 and Windows Server 2008 R2 Security Update (July 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5004307. It is, therefore, affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Security Update 5004307\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-34448\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-33757\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar bulletin = 'MS21-07';\nvar kbs = make_list(\n '5004307',\n '5004289'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nvar share = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.1', \n sp:1,\n rollup_date:'07_2021',\n bulletin:bulletin,\n rollup_kb_list:[5004307, 5004289])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T14:51:34", "description": "The remote Windows host is missing security update 5004302. It is, therefore, affected by multiple vulnerabilities.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T00:00:00", "type": "nessus", "title": "KB5004302: Windows Server 2012 Security Update (July 2021)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31183", "CVE-2021-31979", "CVE-2021-33745", "CVE-2021-33746", "CVE-2021-33749", "CVE-2021-33750", "CVE-2021-33752", "CVE-2021-33754", "CVE-2021-33756", "CVE-2021-33757", "CVE-2021-33763", "CVE-2021-33764", "CVE-2021-33765", "CVE-2021-33780", "CVE-2021-33782", "CVE-2021-33783", "CVE-2021-33786", "CVE-2021-33788", "CVE-2021-34440", "CVE-2021-34441", "CVE-2021-34442", "CVE-2021-34444", "CVE-2021-34446", "CVE-2021-34447", "CVE-2021-34448", "CVE-2021-34455", "CVE-2021-34456", "CVE-2021-34457", "CVE-2021-34459", "CVE-2021-34460", "CVE-2021-34476", "CVE-2021-34492", "CVE-2021-34494", "CVE-2021-34496", "CVE-2021-34497", "CVE-2021-34498", "CVE-2021-34499", "CVE-2021-34500", "CVE-2021-34504", "CVE-2021-34507", "CVE-2021-34511", "CVE-2021-34514", "CVE-2021-34516"], "modified": "2022-05-09T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_JUL_5004294.NASL", "href": "https://www.tenable.com/plugins/nessus/151599", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(151599);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/09\");\n\n script_cve_id(\n \"CVE-2021-31183\",\n \"CVE-2021-31979\",\n \"CVE-2021-33745\",\n \"CVE-2021-33746\",\n \"CVE-2021-33749\",\n \"CVE-2021-33750\",\n \"CVE-2021-33752\",\n \"CVE-2021-33754\",\n \"CVE-2021-33756\",\n \"CVE-2021-33757\",\n \"CVE-2021-33763\",\n \"CVE-2021-33764\",\n \"CVE-2021-33765\",\n \"CVE-2021-33780\",\n \"CVE-2021-33782\",\n \"CVE-2021-33783\",\n \"CVE-2021-33786\",\n \"CVE-2021-33788\",\n \"CVE-2021-34440\",\n \"CVE-2021-34441\",\n \"CVE-2021-34442\",\n \"CVE-2021-34444\",\n \"CVE-2021-34446\",\n \"CVE-2021-34447\",\n \"CVE-2021-34448\",\n \"CVE-2021-34455\",\n \"CVE-2021-34456\",\n \"CVE-2021-34457\",\n \"CVE-2021-34459\",\n \"CVE-2021-34460\",\n \"CVE-2021-34476\",\n \"CVE-2021-34492\",\n \"CVE-2021-34494\",\n \"CVE-2021-34496\",\n \"CVE-2021-34497\",\n \"CVE-2021-34498\",\n \"CVE-2021-34499\",\n \"CVE-2021-34500\",\n \"CVE-2021-34504\",\n \"CVE-2021-34507\",\n \"CVE-2021-34511\",\n \"CVE-2021-34514\",\n \"CVE-2021-34516\"\n );\n script_xref(name:\"MSKB\", value:\"5004294\");\n script_xref(name:\"MSKB\", value:\"5004302\");\n script_xref(name:\"MSFT\", value:\"MS21-5004294\");\n script_xref(name:\"MSFT\", value:\"MS21-5004302\");\n script_xref(name:\"IAVA\", value:\"2021-A-0319-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0318-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"KB5004302: Windows Server 2012 Security Update (July 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security update 5004302. It is, therefore, affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update 5004302\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-34448\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-33757\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/07/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-07';\nkbs = make_list(\n '5004302',\n '5004294'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win8:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.2', \n sp:0,\n rollup_date:'07_2021',\n bulletin:bulletin,\n rollup_kb_list:[5004302, 5004294])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2022-05-30T17:47:10", "description": "### *Detect date*:\n07/13/2021\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, gain privileges, bypass security restrictions, obtain sensitive information, spoof user interface.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows 7 for 32-bit Systems Service Pack 1 \nWindows Server 2012 R2 (Server Core installation) \nWindows Server 2016 \nWindows 10 Version 1909 for x64-based Systems \nWindows 10 Version 1909 for 32-bit Systems \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows 10 Version 21H1 for ARM64-based Systems \nWindows 10 Version 2004 for 32-bit Systems \nWindows Server 2012 \nWindows RT 8.1 \nWindows 10 Version 1909 for ARM64-based Systems \nWindows 10 for 32-bit Systems \nWindows 7 for x64-based Systems Service Pack 1 \nWindows 8.1 for x64-based systems \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows 10 Version 2004 for x64-based Systems \nWindows 10 Version 21H1 for x64-based Systems \nWindows Server 2019 \nWindows Server 2019 (Server Core installation) \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 1607 for x64-based Systems \nWindows 10 Version 20H2 for ARM64-based Systems \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows Server 2016 (Server Core installation) \nWindows Server, version 1909 (Server Core installation) \nWindows 8.1 for 32-bit systems \nWindows Server 2012 (Server Core installation) \nWindows 10 Version 21H1 for 32-bit Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows Server 2012 R2 \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 2004 for ARM64-based Systems \nWindows 10 Version 20H2 for x64-based Systems \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 for x64-based Systems \nWindows 10 Version 20H2 for 32-bit Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows Server, version 2004 (Server Core installation) \nHEVC Video Extensions \nWindows Server, version 20H2 (Server Core Installation) \nWindows 10 Version 1809 for x64-based Systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-33758](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33758>) \n[CVE-2021-34497](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34497>) \n[CVE-2021-34488](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34488>) \n[CVE-2021-33775](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33775>) \n[CVE-2021-34490](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34490>) \n[CVE-2021-34444](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34444>) \n[CVE-2021-33781](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33781>) \n[CVE-2021-34491](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34491>) \n[CVE-2021-34504](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34504>) \n[CVE-2021-34456](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34456>) \n[CVE-2021-33774](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33774>) \n[CVE-2021-34513](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34513>) \n[CVE-2021-33788](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33788>) \n[CVE-2021-33771](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33771>) \n[CVE-2021-34494](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34494>) \n[CVE-2021-34503](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34503>) \n[CVE-2021-34446](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34446>) \n[CVE-2021-33760](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33760>) \n[CVE-2021-31183](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31183>) \n[CVE-2021-34510](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34510>) \n[CVE-2021-34493](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34493>) \n[CVE-2021-33761](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33761>) \n[CVE-2021-34459](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34459>) \n[CVE-2021-33744](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33744>) \n[CVE-2021-33755](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33755>) \n[CVE-2021-33745](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33745>) \n[CVE-2021-34440](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34440>) \n[CVE-2021-33749](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33749>) \n[CVE-2021-33764](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33764>) \n[CVE-2021-33743](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33743>) \n[CVE-2021-33757](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33757>) \n[CVE-2021-34489](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34489>) \n[CVE-2021-34441](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34441>) \n[CVE-2021-33784](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33784>) \n[CVE-2021-34525](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34525>) \n[CVE-2021-34507](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34507>) \n[CVE-2021-34516](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34516>) \n[CVE-2021-31947](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31947>) \n[CVE-2021-33780](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33780>) \n[CVE-2021-34476](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34476>) \n[CVE-2021-34511](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34511>) \n[CVE-2021-34458](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34458>) \n[CVE-2021-34500](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34500>) \n[CVE-2021-34512](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34512>) \n[CVE-2021-34496](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34496>) \n[CVE-2021-34460](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34460>) \n[CVE-2021-33783](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33783>) \n[CVE-2021-34492](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34492>) \n[CVE-2021-33763](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33763>) \n[CVE-2021-33785](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33785>) \n[CVE-2021-34442](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34442>) \n[CVE-2021-33765](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33765>) \n[CVE-2021-34450](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34450>) \n[CVE-2021-33786](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33786>) \n[CVE-2021-34461](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34461>) \n[CVE-2021-34462](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34462>) \n[CVE-2021-34466](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34466>) \n[CVE-2021-33754](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33754>) \n[CVE-2021-33752](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33752>) \n[CVE-2021-33750](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33750>) \n[CVE-2021-33776](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33776>) \n[CVE-2021-33759](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33759>) \n[CVE-2021-33779](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33779>) \n[CVE-2021-31979](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31979>) \n[CVE-2021-33756](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33756>) \n[CVE-2021-34509](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34509>) \n[CVE-2021-34508](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34508>) \n[CVE-2021-33751](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33751>) \n[CVE-2021-34449](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34449>) \n[CVE-2021-33777](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33777>) \n[CVE-2021-34448](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34448>) \n[CVE-2021-34499](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34499>) \n[CVE-2021-34438](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34438>) \n[CVE-2021-34457](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34457>) \n[CVE-2021-34445](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34445>) \n[CVE-2021-31961](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31961>) \n[CVE-2021-34455](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34455>) \n[CVE-2021-33772](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33772>) \n[CVE-2021-33746](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33746>) \n[CVE-2021-34498](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34498>) \n[CVE-2021-34447](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34447>) \n[CVE-2021-34521](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34521>) \n[CVE-2021-33778](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33778>) \n[CVE-2021-34439](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34439>) \n[CVE-2021-33740](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33740>) \n[CVE-2021-33782](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33782>) \n[CVE-2021-34514](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34514>) \n[CVE-2021-34454](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34454>) \n[CVE-2021-33773](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33773>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *CVE-IDS*:\n[CVE-2021-33758](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33758>)4.0Warning \n[CVE-2021-34497](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34497>)6.8High \n[CVE-2021-34488](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34488>)4.6Warning \n[CVE-2021-33775](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33775>)6.8High \n[CVE-2021-34490](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34490>)5.0Critical \n[CVE-2021-34444](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34444>)4.0Warning \n[CVE-2021-33781](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33781>)5.5High \n[CVE-2021-34491](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34491>)4.9Warning \n[CVE-2021-34504](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34504>)6.8High \n[CVE-2021-34456](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34456>)4.6Warning \n[CVE-2021-33774](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33774>)4.6Warning \n[CVE-2021-34513](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34513>)7.2High \n[CVE-2021-33788](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33788>)5.0Critical \n[CVE-2021-33771](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33771>)7.2High \n[CVE-2021-34494](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34494>)6.5High \n[CVE-2021-34503](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34503>)6.8High \n[CVE-2021-34446](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34446>)6.8High \n[CVE-2021-33760](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33760>)2.1Warning \n[CVE-2021-31183](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31183>)5.0Critical \n[CVE-2021-34510](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34510>)4.6Warning \n[CVE-2021-34493](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34493>)4.6Warning \n[CVE-2021-33761](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33761>)4.6Warning \n[CVE-2021-34459](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34459>)4.6Warning \n[CVE-2021-33744](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33744>)7.2High \n[CVE-2021-33755](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33755>)5.0Critical \n[CVE-2021-33745](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33745>)4.0Warning \n[CVE-2021-34440](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34440>)2.1Warning \n[CVE-2021-33749](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33749>)6.8High \n[CVE-2021-33764](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33764>)4.3Warning \n[CVE-2021-33743](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33743>)4.6Warning \n[CVE-2021-33757](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33757>)7.5Critical \n[CVE-2021-34489](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34489>)6.8High \n[CVE-2021-34441](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34441>)6.8High \n[CVE-2021-33784](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33784>)4.6Warning \n[CVE-2021-34525](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34525>)6.5High \n[CVE-2021-34507](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34507>)4.3Warning \n[CVE-2021-34516](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34516>)4.6Warning \n[CVE-2021-31947](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31947>)6.8High \n[CVE-2021-33780](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33780>)6.5High \n[CVE-2021-34476](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34476>)5.0Critical \n[CVE-2021-34511](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34511>)4.6Warning \n[CVE-2021-34458](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34458>)9.0Critical \n[CVE-2021-34500](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34500>)4.0Warning \n[CVE-2021-34512](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34512>)7.2High \n[CVE-2021-34496](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34496>)2.1Warning \n[CVE-2021-34460](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34460>)4.6Warning \n[CVE-2021-33783](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33783>)4.0Warning \n[CVE-2021-34492](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34492>)5.8High \n[CVE-2021-33763](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33763>)2.1Warning \n[CVE-2021-33785](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33785>)5.0Critical \n[CVE-2021-34442](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34442>)5.0Critical \n[CVE-2021-33765](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33765>)2.1Warning \n[CVE-2021-34450](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34450>)9.0Critical \n[CVE-2021-33786](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33786>)6.5High \n[CVE-2021-34461](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34461>)4.6Warning \n[CVE-2021-34462](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34462>)4.6Warning \n[CVE-2021-34466](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34466>)3.6Warning \n[CVE-2021-33754](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33754>)6.0High \n[CVE-2021-33752](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33752>)6.8High \n[CVE-2021-33750](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33750>)6.8High \n[CVE-2021-33776](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33776>)6.8High \n[CVE-2021-33759](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33759>)4.6Warning \n[CVE-2021-33779](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33779>)5.5High \n[CVE-2021-31979](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31979>)7.2High \n[CVE-2021-33756](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33756>)6.8High \n[CVE-2021-34509](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34509>)2.1Warning \n[CVE-2021-34508](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34508>)6.5High \n[CVE-2021-33751](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33751>)4.6Warning \n[CVE-2021-34449](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34449>)4.6Warning \n[CVE-2021-33777](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33777>)6.8High \n[CVE-2021-34448](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34448>)9.3Critical \n[CVE-2021-34499](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34499>)4.0Warning \n[CVE-2021-34438](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34438>)6.8High \n[CVE-2021-34457](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34457>)2.1Warning \n[CVE-2021-34445](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34445>)4.6Warning \n[CVE-2021-31961](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31961>)3.6Warning \n[CVE-2021-34455](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34455>)4.6Warning \n[CVE-2021-33772](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33772>)5.0Critical \n[CVE-2021-33746](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33746>)6.5High \n[CVE-2021-34498](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34498>)7.2High \n[CVE-2021-34447](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34447>)6.8High \n[CVE-2021-34521](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34521>)6.8High \n[CVE-2021-33778](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33778>)6.8High \n[CVE-2021-34439](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34439>)9.3Critical \n[CVE-2021-33740](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33740>)9.3Critical \n[CVE-2021-33782](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33782>)4.3Warning \n[CVE-2021-34514](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34514>)7.2High \n[CVE-2021-34454](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34454>)2.1Warning \n[CVE-2021-33773](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33773>)4.6Warning\n\n### *KB list*:\n[5004238](<http://support.microsoft.com/kb/5004238>) \n[5004302](<http://support.microsoft.com/kb/5004302>) \n[5004294](<http://support.microsoft.com/kb/5004294>) \n[5004237](<http://support.microsoft.com/kb/5004237>) \n[5004244](<http://support.microsoft.com/kb/5004244>) \n[5004298](<http://support.microsoft.com/kb/5004298>) \n[5004285](<http://support.microsoft.com/kb/5004285>) \n[5004249](<http://support.microsoft.com/kb/5004249>) \n[5004245](<http://support.microsoft.com/kb/5004245>) \n[5005563](<http://support.microsoft.com/kb/5005563>) \n[5006674](<http://support.microsoft.com/kb/5006674>) \n[5006669](<http://support.microsoft.com/kb/5006669>) \n[5010419](<http://support.microsoft.com/kb/5010419>) \n[5010395](<http://support.microsoft.com/kb/5010395>) \n[5010358](<http://support.microsoft.com/kb/5010358>) \n[5010359](<http://support.microsoft.com/kb/5010359>) \n[5010392](<http://support.microsoft.com/kb/5010392>) \n[5010412](<http://support.microsoft.com/kb/5010412>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.1, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 9.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2021-07-13T00:00:00", "type": "kaspersky", "title": "KLA12221 Multiple vulnerabillities in Microsoft Windows", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31183", "CVE-2021-31947", "CVE-2021-31961", "CVE-2021-31979", "CVE-2021-33740", "CVE-2021-33743", "CVE-2021-33744", "CVE-2021-33745", "CVE-2021-33746", "CVE-2021-33749", "CVE-2021-33750", "CVE-2021-33751", "CVE-2021-33752", "CVE-2021-33754", "CVE-2021-33755", "CVE-2021-33756", "CVE-2021-33757", "CVE-2021-33758", "CVE-2021-33759", "CVE-2021-33760", "CVE-2021-33761", "CVE-2021-33763", "CVE-2021-33764", "CVE-2021-33765", "CVE-2021-33771", "CVE-2021-33772", "CVE-2021-33773", "CVE-2021-33774", "CVE-2021-33775", "CVE-2021-33776", "CVE-2021-33777", "CVE-2021-33778", "CVE-2021-33779", "CVE-2021-33780", "CVE-2021-33781", "CVE-2021-33782", "CVE-2021-33783", "CVE-2021-33784", "CVE-2021-33785", "CVE-2021-33786", "CVE-2021-33788", "CVE-2021-34438", "CVE-2021-34439", "CVE-2021-34440", "CVE-2021-34441", "CVE-2021-34442", "CVE-2021-34444", "CVE-2021-34445", "CVE-2021-34446", "CVE-2021-34447", "CVE-2021-34448", "CVE-2021-34449", "CVE-2021-34450", "CVE-2021-34454", "CVE-2021-34455", "CVE-2021-34456", "CVE-2021-34457", "CVE-2021-34458", "CVE-2021-34459", "CVE-2021-34460", "CVE-2021-34461", "CVE-2021-34462", "CVE-2021-34466", "CVE-2021-34476", "CVE-2021-34488", "CVE-2021-34489", "CVE-2021-34490", "CVE-2021-34491", "CVE-2021-34492", "CVE-2021-34493", "CVE-2021-34494", "CVE-2021-34496", "CVE-2021-34497", "CVE-2021-34498", "CVE-2021-34499", "CVE-2021-34500", "CVE-2021-34503", "CVE-2021-34504", "CVE-2021-34507", "CVE-2021-34508", "CVE-2021-34509", "CVE-2021-34510", "CVE-2021-34511", "CVE-2021-34512", "CVE-2021-34513", "CVE-2021-34514", "CVE-2021-34516", "CVE-2021-34521", "CVE-2021-34525"], "modified": "2022-05-24T00:00:00", "id": "KLA12221", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12221/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-30T17:47:07", "description": "### *Detect date*:\n07/13/2021\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, spoof user interface, execute arbitrary code, cause denial of service, bypass security restrictions, gain privileges.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows 7 for 32-bit Systems Service Pack 1 \nWindows Server 2012 R2 (Server Core installation) \nWindows Server 2016 \nWindows 10 Version 1909 for x64-based Systems \nWindows 10 Version 1909 for 32-bit Systems \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows 10 Version 21H1 for ARM64-based Systems \nWindows 10 Version 2004 for 32-bit Systems \nWindows Server 2012 \nWindows RT 8.1 \nWindows 10 Version 1909 for ARM64-based Systems \nWindows 10 for 32-bit Systems \nWindows 7 for x64-based Systems Service Pack 1 \nWindows 8.1 for x64-based systems \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows 10 Version 2004 for x64-based Systems \nWindows 10 Version 21H1 for x64-based Systems \nWindows Server 2019 \nWindows Server 2019 (Server Core installation) \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 1607 for x64-based Systems \nWindows 10 Version 20H2 for ARM64-based Systems \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows Server 2016 (Server Core installation) \nWindows 8.1 for 32-bit systems \nWindows Server 2012 (Server Core installation) \nWindows 10 Version 21H1 for 32-bit Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows Server 2012 R2 \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 2004 for ARM64-based Systems \nWindows 10 Version 20H2 for x64-based Systems \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 for x64-based Systems \nWindows 10 Version 20H2 for 32-bit Systems \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows Server, version 2004 (Server Core installation) \nWindows Server, version 20H2 (Server Core Installation) \nWindows 10 Version 1809 for x64-based Systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-33783](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33783>) \n[CVE-2021-34492](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34492>) \n[CVE-2021-34497](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34497>) \n[CVE-2021-34442](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34442>) \n[CVE-2021-34444](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34444>) \n[CVE-2021-33765](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33765>) \n[CVE-2021-34504](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34504>) \n[CVE-2021-33786](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33786>) \n[CVE-2021-34456](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34456>) \n[CVE-2021-34494](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34494>) \n[CVE-2021-33788](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33788>) \n[CVE-2021-33754](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33754>) \n[CVE-2021-34446](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34446>) \n[CVE-2021-33752](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33752>) \n[CVE-2021-31183](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31183>) \n[CVE-2021-33750](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33750>) \n[CVE-2021-33745](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33745>) \n[CVE-2021-31979](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31979>) \n[CVE-2021-33756](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33756>) \n[CVE-2021-34440](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34440>) \n[CVE-2021-33749](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33749>) \n[CVE-2021-33764](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33764>) \n[CVE-2021-34448](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34448>) \n[CVE-2021-34499](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34499>) \n[CVE-2021-33757](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33757>) \n[CVE-2021-34457](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34457>) \n[CVE-2021-34441](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34441>) \n[CVE-2021-34507](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34507>) \n[CVE-2021-33746](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33746>) \n[CVE-2021-34498](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34498>) \n[CVE-2021-34516](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34516>) \n[CVE-2021-34447](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34447>) \n[CVE-2021-33780](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33780>) \n[CVE-2021-34476](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34476>) \n[CVE-2021-34511](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34511>) \n[CVE-2021-33782](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-33782>) \n[CVE-2021-34514](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34514>) \n[CVE-2021-34500](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34500>) \n[CVE-2021-34496](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-34496>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *CVE-IDS*:\n[CVE-2021-34497](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34497>)6.8High \n[CVE-2021-34444](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34444>)4.0Warning \n[CVE-2021-34504](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34504>)6.8High \n[CVE-2021-34456](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34456>)4.6Warning \n[CVE-2021-33788](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33788>)5.0Critical \n[CVE-2021-34494](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34494>)6.5High \n[CVE-2021-34446](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34446>)6.8High \n[CVE-2021-31183](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31183>)5.0Critical \n[CVE-2021-33745](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33745>)4.0Warning \n[CVE-2021-34440](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34440>)2.1Warning \n[CVE-2021-33749](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33749>)6.8High \n[CVE-2021-33764](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33764>)4.3Warning \n[CVE-2021-33757](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33757>)7.5Critical \n[CVE-2021-34441](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34441>)6.8High \n[CVE-2021-34507](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34507>)4.3Warning \n[CVE-2021-34516](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34516>)4.6Warning \n[CVE-2021-33780](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33780>)6.5High \n[CVE-2021-34476](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34476>)5.0Critical \n[CVE-2021-34511](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34511>)4.6Warning \n[CVE-2021-34500](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34500>)4.0Warning \n[CVE-2021-34496](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34496>)2.1Warning \n[CVE-2021-33783](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33783>)4.0Warning \n[CVE-2021-34492](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34492>)5.8High \n[CVE-2021-34442](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34442>)5.0Critical \n[CVE-2021-33765](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33765>)2.1Warning \n[CVE-2021-33786](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33786>)6.5High \n[CVE-2021-33754](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33754>)6.0High \n[CVE-2021-33752](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33752>)6.8High \n[CVE-2021-33750](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33750>)6.8High \n[CVE-2021-31979](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31979>)7.2High \n[CVE-2021-33756](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33756>)6.8High \n[CVE-2021-34448](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34448>)9.3Critical \n[CVE-2021-34499](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34499>)4.0Warning \n[CVE-2021-34457](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34457>)2.1Warning \n[CVE-2021-33746](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33746>)6.5High \n[CVE-2021-34498](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34498>)7.2High \n[CVE-2021-34447](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34447>)6.8High \n[CVE-2021-33782](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33782>)4.3Warning \n[CVE-2021-34514](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34514>)7.2High\n\n### *KB list*:\n[5004289](<http://support.microsoft.com/kb/5004289>) \n[5004307](<http://support.microsoft.com/kb/5004307>) \n[5004299](<http://support.microsoft.com/kb/5004299>) \n[5004305](<http://support.microsoft.com/kb/5004305>) \n[5005563](<http://support.microsoft.com/kb/5005563>) \n[5010384](<http://support.microsoft.com/kb/5010384>) \n[5010422](<http://support.microsoft.com/kb/5010422>) \n[5010403](<http://support.microsoft.com/kb/5010403>) \n[5010404](<http://support.microsoft.com/kb/5010404>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T00:00:00", "type": "kaspersky", "title": "KLA12226 Multiple vulnerabilities in Microsoft Products (ESU)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31183", "CVE-2021-31979", "CVE-2021-33745", "CVE-2021-33746", "CVE-2021-33749", "CVE-2021-33750", "CVE-2021-33752", "CVE-2021-33754", "CVE-2021-33756", "CVE-2021-33757", "CVE-2021-33764", "CVE-2021-33765", "CVE-2021-33780", "CVE-2021-33782", "CVE-2021-33783", "CVE-2021-33786", "CVE-2021-33788", "CVE-2021-34440", "CVE-2021-34441", "CVE-2021-34442", "CVE-2021-34444", "CVE-2021-34446", "CVE-2021-34447", "CVE-2021-34448", "CVE-2021-34456", "CVE-2021-34457", "CVE-2021-34476", "CVE-2021-34492", "CVE-2021-34494", "CVE-2021-34496", "CVE-2021-34497", "CVE-2021-34498", "CVE-2021-34499", "CVE-2021-34500", "CVE-2021-34504", "CVE-2021-34507", "CVE-2021-34511", "CVE-2021-34514", "CVE-2021-34516"], "modified": "2022-05-24T00:00:00", "id": "KLA12226", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12226/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "rapid7blog": [{"lastseen": "2021-07-28T14:56:11", "description": "\n\n[Microsoft has patched another 117 CVEs](<https://msrc.microsoft.com/update-guide/releaseNote/2021-Jul>), returning to volumes seen in early 2021 and most of 2020. It would appear that the recent trend of approximately 50 vulnerability fixes per month was not indicative of a slowing pace. This month there were 13 vulnerabilities rated Critical with nearly the rest being rated Important. Thankfully, none of the updates published today require additional steps to remediate, so administrators should be able to rely on their normal patching process. Once[ CVE-2021-34527](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527>) has been remediated, priority should be to patch public facing DNS and Exchange servers, followed by Workstations, SharePoint servers, and finally Office applications.\n\nIt seems like the PrintNightmare is nearly over. While the past two weeks have been a frenzy for the security community there has been no new information since the end of last week when Microsoft made a final revision to their guidance on[ CVE-2021-34527](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527>). If you haven\u2019t patched this yet, this is your daily reminder. For further details [please see our blog](<https://www.rapid7.com/blog/post/2021/06/30/cve-2021-1675-printnightmare-patch-does-not-remediate-vulnerability/>) on the topic.\n\n## Multiple Critical DNS Vulnerabilities Patched\n\nAdministrators should focus their efforts on the 11 vulnerabilities in Windows DNS server to reduce the most risk. The two most important of these vulnerabilities are [CVE-2021-34494](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34494>) and [CVE-2021-33780](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33780>). Exploitation of either of these vulnerabilities would result in Remote Code Execution with SYSTEM privileges without any user interaction via the network. Given the network exposure of DNS servers these vulnerabilities could prove to be troublesome if an exploit were to be developed. Microsoft lists [CVE-2021-33780](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-33780>) as \u201cExploitation More Likely\u201d so it may only be a matter of time before attackers attempt to make use of these flaws.\n\n## New Exchange Updates Available\n\nOnly 4 of the 7 Exchange CVEs being disclosed this month are new. The two most severe vulnerabilities were patched in back in April and were mistakenly not disclosed. This means that if you applied the April 2021 updates you will not need to take any action for [CVE-2021-34473](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34473>), [CVE-2021-34523](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34523>), or [CVE-2021-33766](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-33766>). Of the 4 newly patched vulnerabilities the most notable is [CVE-2021-31206](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31206>), a remote code execution flaw discovered in the recent Pwn2Own competition. \n\n## Scripting Engine Exploited in the Wild\n\nExploitation of [CVE-2021-34448](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34448>) has been observed in the wild by researchers. There are no details on the frequency or spread of this exploit. This vulnerability requires the user to visit a link to download a malicious file. As with other vulnerabilities that require user interaction, strong security hygiene is the first line of defense.\n\n## Summary Tables\n\nHere are this month's patched vulnerabilities split by the product family.\n\n## Apps Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-33753](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33753>) | Microsoft Bing Search Spoofing Vulnerability | No | No | 4.7 | Yes \n \n## Developer Tools Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-34528](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34528>) | Visual Studio Code Remote Code Execution Vulnerability | No | No | 7.8 | No \n[CVE-2021-34529](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34529>) | Visual Studio Code Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-34477](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34477>) | Visual Studio Code .NET Runtime Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-33767](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33767>) | Open Enclave SDK Elevation of Privilege Vulnerability | No | No | 8.2 | Yes \n[CVE-2021-34479](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34479>) | Microsoft Visual Studio Spoofing Vulnerability | No | No | 7.8 | No \n \n## Exchange Server Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-34473](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34473>) | Microsoft Exchange Server Remote Code Execution Vulnerability | No | Yes | 9.1 | No \n[CVE-2021-31206](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31206>) | Microsoft Exchange Server Remote Code Execution Vulnerability | No | No | 7.6 | Yes \n[CVE-2021-31196](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31196>) | Microsoft Exchange Server Remote Code Execution Vulnerability | No | No | 7.2 | No \n[CVE-2021-34523](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34523>) | Microsoft Exchange Server Elevation of Privilege Vulnerability | No | Yes | 9 | No \n[CVE-2021-33768](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33768>) | Microsoft Exchange Server Elevation of Privilege Vulnerability | No | No | 8 | Yes \n[CVE-2021-34470](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34470>) | Microsoft Exchange Server Elevation of Privilege Vulnerability | No | No | 8 | Yes \n[CVE-2021-33766](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33766>) | Microsoft Exchange Information Disclosure Vulnerability | No | No | 7.3 | Yes \n \n## Microsoft Dynamics Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-34474](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34474>) | Dynamics Business Central Remote Code Execution Vulnerability | No | No | 8 | Yes \n \n## Microsoft Office Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-34452](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34452>) | Microsoft Word Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-34517](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34517>) | Microsoft SharePoint Server Spoofing Vulnerability | No | No | 5.3 | No \n[CVE-2021-34520](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34520>) | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 8.1 | No \n[CVE-2021-34467](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34467>) | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 7.1 | No \n[CVE-2021-34468](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34468>) | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 7.1 | Yes \n[CVE-2021-34519](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34519>) | Microsoft SharePoint Server Information Disclosure Vulnerability | No | No | 5.3 | Yes \n[CVE-2021-34469](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34469>) | Microsoft Office Security Feature Bypass Vulnerability | No | No | 8.2 | Yes \n[CVE-2021-34451](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34451>) | Microsoft Office Online Server Spoofing Vulnerability | No | No | 5.3 | Yes \n[CVE-2021-34501](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34501>) | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-34518](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34518>) | Microsoft Excel Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n \n## SQL Server Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-31984](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31984>) | Power BI Remote Code Execution Vulnerability | No | No | 7.6 | Yes \n \n## System Center Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-34464](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34464>) | Microsoft Defender Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-34522](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34522>) | Microsoft Defender Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n \n## Windows Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-33772](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33772>) | Windows TCP/IP Driver Denial of Service Vulnerability | No | No | 7.5 | No \n[CVE-2021-34490](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34490>) | Windows TCP/IP Driver Denial of Service Vulnerability | No | No | 7.5 | No \n[CVE-2021-33744](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33744>) | Windows Secure Kernel Mode Security Feature Bypass Vulnerability | No | No | 5.3 | No \n[CVE-2021-33763](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33763>) | Windows Remote Access Connection Manager Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-34454](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34454>) | Windows Remote Access Connection Manager Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-33761](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33761>) | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-33773](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33773>) | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-34445](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34445>) | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-33743](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33743>) | Windows Projected File System Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-34493](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34493>) | Windows Partition Management Driver Elevation of Privilege Vulnerability | No | No | 6.7 | No \n[CVE-2021-33740](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33740>) | Windows Media Remote Code Execution Vulnerability | No | No | 7.8 | No \n[CVE-2021-34458](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34458>) | Windows Kernel Remote Code Execution Vulnerability | No | No | 9.9 | Yes \n[CVE-2021-34508](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34508>) | Windows Kernel Remote Code Execution Vulnerability | No | No | 8.8 | No \n[CVE-2021-33771](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33771>) | Windows Kernel Elevation of Privilege Vulnerability | Yes | No | 7.8 | No \n[CVE-2021-31961](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31961>) | Windows InstallService Elevation of Privilege Vulnerability | No | No | 6.1 | Yes \n[CVE-2021-34450](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34450>) | Windows Hyper-V Remote Code Execution Vulnerability | No | No | 8.5 | Yes \n[CVE-2021-33758](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33758>) | Windows Hyper-V Denial of Service Vulnerability | No | No | 7.7 | No \n[CVE-2021-33755](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33755>) | Windows Hyper-V Denial of Service Vulnerability | No | No | 6.3 | No \n[CVE-2021-34466](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34466>) | Windows Hello Security Feature Bypass Vulnerability | No | No | 5.7 | Yes \n[CVE-2021-34438](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34438>) | Windows Font Driver Host Remote Code Execution Vulnerability | No | No | 7.8 | No \n[CVE-2021-34455](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34455>) | Windows File History Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-33774](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33774>) | Windows Event Tracing Elevation of Privilege Vulnerability | No | No | 7 | No \n[CVE-2021-33759](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33759>) | Windows Desktop Bridge Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-34525](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34525>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 8.8 | No \n[CVE-2021-34461](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34461>) | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-34488](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34488>) | Windows Console Driver Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-33784](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33784>) | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-34462](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34462>) | Windows AppX Deployment Extensions Elevation of Privilege Vulnerability | No | No | 7 | No \n[CVE-2021-34459](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34459>) | Windows AppContainer Elevation Of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-33785](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33785>) | Windows AF_UNIX Socket Provider Denial of Service Vulnerability | No | No | 7.5 | No \n[CVE-2021-33779](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33779>) | Windows ADFS Security Feature Bypass Vulnerability | No | Yes | 8.1 | Yes \n[CVE-2021-34491](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34491>) | Win32k Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-34449](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34449>) | Win32k Elevation of Privilege Vulnerability | No | No | 7 | No \n[CVE-2021-34509](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34509>) | Storage Spaces Controller Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-34460](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34460>) | Storage Spaces Controller Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-34510](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34510>) | Storage Spaces Controller Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-34512](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34512>) | Storage Spaces Controller Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-34513](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34513>) | Storage Spaces Controller Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-33751](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33751>) | Storage Spaces Controller Elevation of Privilege Vulnerability | No | No | 7 | No \n[CVE-2021-34521](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34521>) | Raw Image Extension Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-34439](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34439>) | Microsoft Windows Media Foundation Remote Code Execution Vulnerability | No | No | 7.8 | No \n[CVE-2021-34503](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34503>) | Microsoft Windows Media Foundation Remote Code Execution Vulnerability | No | No | 7.8 | No \n[CVE-2021-33760](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33760>) | Media Foundation Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-31947](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31947>) | HEVC Video Extensions Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-33775](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33775>) | HEVC Video Extensions Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-33776](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33776>) | HEVC Video Extensions Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-33777](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33777>) | HEVC Video Extensions Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-33778](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33778>) | HEVC Video Extensions Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-34489](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34489>) | DirectWrite Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-33781](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33781>) | Active Directory Security Feature Bypass Vulnerability | No | Yes | 8.1 | No \n \n## Windows ESU Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-31183](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31183>) | Windows TCP/IP Driver Denial of Service Vulnerability | No | No | 7.5 | No \n[CVE-2021-33757](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33757>) | Windows Security Account Manager Remote Protocol Security Feature Bypass Vulnerability | No | No | 5.3 | Yes \n[CVE-2021-33783](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33783>) | Windows SMB Information Disclosure Vulnerability | No | No | 6.5 | Yes \n[CVE-2021-34507](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34507>) | Windows Remote Assistance Information Disclosure Vulnerability | No | No | 6.5 | Yes \n[CVE-2021-34457](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34457>) | Windows Remote Access Connection Manager Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-34456](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34456>) | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-34527](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34527>) | Windows Print Spooler Remote Code Execution Vulnerability | Yes | Yes | 8.8 | Yes \n[CVE-2021-34497](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34497>) | Windows MSHTML Platform Remote Code Execution Vulnerability | No | No | 6.8 | Yes \n[CVE-2021-34447](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34447>) | Windows MSHTML Platform Remote Code Execution Vulnerability | No | No | 6.8 | Yes \n[CVE-2021-33786](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33786>) | Windows LSA Security Feature Bypass Vulnerability | No | No | 8.1 | Yes \n[CVE-2021-33788](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33788>) | Windows LSA Denial of Service Vulnerability | No | No | 7.5 | No \n[CVE-2021-33764](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33764>) | Windows Key Distribution Center Information Disclosure Vulnerability | No | No | 5.9 | Yes \n[CVE-2021-34500](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34500>) | Windows Kernel Memory Information Disclosure Vulnerability | No | No | 6.3 | Yes \n[CVE-2021-31979](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31979>) | Windows Kernel Elevation of Privilege Vulnerability | Yes | No | 7.8 | No \n[CVE-2021-34514](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34514>) | Windows Kernel Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-33765](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33765>) | Windows Installer Spoofing Vulnerability | No | No | 6.2 | No \n[CVE-2021-34511](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34511>) | Windows Installer Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-34446](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34446>) | Windows HTML Platforms Security Feature Bypass Vulnerability | No | No | 8 | No \n[CVE-2021-34496](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34496>) | Windows GDI Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-34498](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34498>) | Windows GDI Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-33749](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33749>) | Windows DNS Snap-in Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2021-33750](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33750>) | Windows DNS Snap-in Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2021-33752](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33752>) | Windows DNS Snap-in Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2021-33756](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33756>) | Windows DNS Snap-in Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2021-34494](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34494>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2021-33780](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33780>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2021-33746](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33746>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 8 | No \n[CVE-2021-33754](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33754>) | Windows DNS Server Remote Code Execution Vulnerability | No | No | 8 | No \n[CVE-2021-34442](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34442>) | Windows DNS Server Denial of Service Vulnerability | No | No | 7.5 | Yes \n[CVE-2021-34444](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34444>) | Windows DNS Server Denial of Service Vulnerability | No | No | 6.5 | Yes \n[CVE-2021-34499](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34499>) | Windows DNS Server Denial of Service Vulnerability | No | No | 6.5 | No \n[CVE-2021-33745](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33745>) | Windows DNS Server Denial of Service Vulnerability | No | No | 6.5 | Yes \n[CVE-2021-34492](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34492>) | Windows Certificate Spoofing Vulnerability | No | Yes | 8.1 | No \n[CVE-2021-33782](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33782>) | Windows Authenticode Spoofing Vulnerability | No | No | 5.5 | No \n[CVE-2021-34504](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34504>) | Windows Address Book Remote Code Execution Vulnerability | No | No | 7.8 | No \n[CVE-2021-34516](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34516>) | Win32k Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-34448](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34448>) | Scripting Engine Memory Corruption Vulnerability | Yes | No | 6.8 | Yes \n[CVE-2021-34441](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34441>) | Microsoft Windows Media Foundation Remote Code Execution Vulnerability | No | No | 7.8 | No \n[CVE-2021-34440](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34440>) | GDI+ Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-34476](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34476>) | Bowser.sys Denial of Service Vulnerability | No | No | 7.5 | No \n \n## Summary Graphs\n\n", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2021-07-13T20:56:26", "type": "rapid7blog", "title": "Patch Tuesday - July 2021", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-1675", "CVE-2021-31183", "CVE-2021-31196", "CVE-2021-31206", "CVE-2021-31947", "CVE-2021-31961", "CVE-2021-31979", "CVE-2021-31984", "CVE-2021-33740", "CVE-2021-33743", "CVE-2021-33744", "CVE-2021-33745", "CVE-2021-33746", "CVE-2021-33749", "CVE-2021-33750", "CVE-2021-33751", "CVE-2021-33752", "CVE-2021-33753", "CVE-2021-33754", "CVE-2021-33755", "CVE-2021-33756", "CVE-2021-33757", "CVE-2021-33758", "CVE-2021-33759", "CVE-2021-33760", "CVE-2021-33761", "CVE-2021-33763", "CVE-2021-33764", "CVE-2021-33765", "CVE-2021-33766", "CVE-2021-33767", "CVE-2021-33768", "CVE-2021-33771", "CVE-2021-33772", "CVE-2021-33773", "CVE-2021-33774", "CVE-2021-33775", "CVE-2021-33776", "CVE-2021-33777", "CVE-2021-33778", "CVE-2021-33779", "CVE-2021-33780", "CVE-2021-33781", "CVE-2021-33782", "CVE-2021-33783", "CVE-2021-33784", "CVE-2021-33785", "CVE-2021-33786", "CVE-2021-33788", "CVE-2021-34438", "CVE-2021-34439", "CVE-2021-34440", "CVE-2021-34441", "CVE-2021-34442", "CVE-2021-34444", "CVE-2021-34445", "CVE-2021-34446", "CVE-2021-34447", "CVE-2021-34448", "CVE-2021-34449", "CVE-2021-34450", "CVE-2021-34451", "CVE-2021-34452", "CVE-2021-34454", "CVE-2021-34455", "CVE-2021-34456", "CVE-2021-34457", "CVE-2021-34458", "CVE-2021-34459", "CVE-2021-34460", "CVE-2021-34461", "CVE-2021-34462", "CVE-2021-34464", "CVE-2021-34466", "CVE-2021-34467", "CVE-2021-34468", "CVE-2021-34469", "CVE-2021-34470", "CVE-2021-34473", "CVE-2021-34474", "CVE-2021-34476", "CVE-2021-34477", "CVE-2021-34479", "CVE-2021-34488", "CVE-2021-34489", "CVE-2021-34490", "CVE-2021-34491", "CVE-2021-34492", "CVE-2021-34493", "CVE-2021-34494", "CVE-2021-34496", "CVE-2021-34497", "CVE-2021-34498", "CVE-2021-34499", "CVE-2021-34500", "CVE-2021-34501", "CVE-2021-34503", "CVE-2021-34504", "CVE-2021-34507", "CVE-2021-34508", "CVE-2021-34509", "CVE-2021-34510", "CVE-2021-34511", "CVE-2021-34512", "CVE-2021-34513", "CVE-2021-34514", "CVE-2021-34516", "CVE-2021-34517", "CVE-2021-34518", "CVE-2021-34519", "CVE-2021-34520", "CVE-2021-34521", "CVE-2021-34522", "CVE-2021-34523", "CVE-2021-34525", "CVE-2021-34527", "CVE-2021-34528", "CVE-2021-34529"], "modified": "2021-07-13T20:56:26", "id": "RAPID7BLOG:4B35B23167A9D5E016537F6A81E4E9D4", "href": "https://blog.rapid7.com/2021/07/13/patch-tuesday-july-2021/", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}