VID |
26850 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
Microsoft Security Update for January 2021 is not installed. The remote Windows host is missing a security update.
- An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges. (CVE-2021-1642, CVE-2021-1646, CVE-2021-1648, CVE-2021-1649, CVE-2021-1650, CVE-2021-1651, CVE-2021-1652, CVE-2021-1653, CVE-2021-1654, CVE-2021-1655, CVE-2021-1659, CVE-2021-1661, CVE-2021-1662, CVE-2021-1680, CVE-2021-1682, CVE-2021-1685, CVE-2021-1688, CVE-2021-1689, CVE-2021-1693, CVE-2021-1694, CVE-2021-1695, CVE-2021-1697, CVE-2021-1702, CVE-2021-1704, CVE-2021-1706, CVE-2021-1709)
- A denial of service (DoS) vulnerability. An attacker can exploit this issue to cause the affected component to deny system or application services. (CVE-2021-1679)
- A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application. (CVE-2021-1638, CVE-2021-1669, CVE-2021-1674, CVE-2021-1678, CVE-2021-1683, CVE-2021-1684)
- An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-1637, CVE-2021-1645, CVE-2021-1656, CVE-2021-1672, CVE-2021-1676, CVE-2021-1696, CVE-2021-1699, CVE-2021-1708)
- A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-1657, CVE-2021-1658, CVE-2021-1660, CVE-2021-1664, CVE-2021-1665, CVE-2021-1666, CVE-2021-1667, CVE-2021-1668, CVE-2021-1671, CVE-2021-1673, CVE-2021-1700, CVE-2021-1701, CVE-2021-1710) - An memory corruption vulnerability exists. An attacker can exploit this to corrupt the memory and cause unexpected behaviors within the system/application (CVE-2021-1705)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://support.microsoft.com/en-us/help/4009469 https://support.microsoft.com/en-us/help/4009470 https://support.microsoft.com/en-us/help/4009471 https://support.microsoft.com/en-us/help/4000825
* Platforms Affected: Windows Server 2008 R2 SP1 Windows Server 2008 R2 x64 SP1 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows 10 Windows Server 2016 |
Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin January 2021 Microsoft security update at
https://support.microsoft.com/en-us/help/4009469 https://support.microsoft.com/en-us/help/4009470 https://support.microsoft.com/en-us/help/4009471 https://support.microsoft.com/en-us/help/4000825 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2021-1637,CVE-2021-1638,CVE-2021-1642,CVE-2021-1645,CVE-2021-1646,CVE-2021-1648,CVE-2021-1649,CVE-2021-1650,CVE-2021-1651,CVE-2021-1652 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|