5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
5.7 Medium
AI Score
Confidence
High
2.3 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:M/Au:S/C:N/I:P/A:N
0.633 Medium
EPSS
Percentile
97.8%
This security update resolves a Microsoft SharePoint Server information disclosure vulnerability. To learn more about the vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2021-34519.
**Note:**To apply this security update, you must have the release version of Microsoft SharePoint Enterprise Server 2016 installed on the computer.
This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:
This article contains the following fix and improvement. To enable this update and fix the issue completely, you have to install KB 5001976 together with this update.
This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.
To get the standalone package for this update, go to the Microsoft Update Catalog website.
You can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.
For deployment information about this update, see Security update deployment information: July 13, 2021 (KB5004480).
This security update replaces previously released security update 5001922.
File name | SHA256 hash |
---|---|
wssloc2016-kb5001981-fullfile-x64-glb.exe | 29AA31FBB3676B072ACDE83F1C53208EF5AF8F8C0F9194EE76721A7B921AFDB2 |
Download the list of files that are included in security update 5001981.
Protect yourself online: Windows Security supportLearn how we guard against cyber threats: Microsoft Security
The following table summarizes some of the most important changes to this topic.Date | Description |
---|---|
July 22, 2021 | Update the issue description about the bypass list functionality in the Improvements and fixes section. |
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
5.7 Medium
AI Score
Confidence
High
2.3 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:A/AC:M/Au:S/C:N/I:P/A:N
0.633 Medium
EPSS
Percentile
97.8%