Lucene search

K
vulnrichmentMicrosoftVULNRICHMENT:CVE-2021-40462
HistoryOct 13, 2021 - 12:27 a.m.

CVE-2021-40462 Windows Media Foundation Dolby Digital Atmos Decoders Remote Code Execution Vulnerability

2021-10-1300:27:00
microsoft
github.com
5
windows media foundation; dolby digital atmos decoders; remote code execution; vulnerability

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

AI Score

6.8

Confidence

Low

EPSS

0.041

Percentile

92.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

CNA Affected

[
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x86:*",
      "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x64:*",
      "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:arm64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows 10 Version 1809",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.17763.2237",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "32-bit Systems",
      "x64-based Systems",
      "ARM64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2019",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.17763.2237",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2019 (Server Core installation)",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.17763.2237",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*",
      "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*",
      "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1854:*:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows 10 Version 1909",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.18363.1854",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "32-bit Systems",
      "x64-based Systems",
      "ARM64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1288:*:*:*:*:*:x64:*",
      "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1288:*:*:*:*:*:arm64:*",
      "cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1288:*:*:*:*:*:x86:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows 10 Version 21H1",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.19043.1288",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems",
      "ARM64-based Systems",
      "32-bit Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2022",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.20348.288",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows 10 Version 2004",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.19041.1288",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "32-bit Systems",
      "ARM64-based Systems",
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server version 2004",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.19041.1288",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1288:*:*:*:*:*:x86:*",
      "cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1288:*:*:*:*:*:arm64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows 10 Version 20H2",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.19042.1288",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "32-bit Systems",
      "ARM64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1288:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server version 20H2",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.19042.1288",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.258:*:*:*:*:*:x64:*",
      "cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.258:*:*:*:*:*:arm64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows 11 version 21H2",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.22000.258",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems",
      "ARM64-based Systems"
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

AI Score

6.8

Confidence

Low

EPSS

0.041

Percentile

92.3%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total