Korean
<< Back
VID 26853
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description Microsoft Security Update for April 2021 is not installed. The remote Windows host is missing a security update.

- Win32k Elevation of Privilege Vulnerability (CVE-2021-27072, CVE-2021-28310)

- Windows Media Photo Codec Information Disclosure Vulnerability (CVE-2021-27079)

- Windows Event Tracing Elevation of Privilege Vulnerability (CVE-2021-27088)

- Microsoft Internet Messaging API Remote Code Execution Vulnerability (CVE-2021-27089)

- Azure AD Web Sign-in Security Feature Bypass Vulnerability (CVE-2021-27092)

- Windows Kernel Information Disclosure Vulnerability (CVE-2021-27093, CVE-2021-28309)

- Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability (CVE-2021-27094, CVE-2021-28447)

- Windows Media Video Decoder Remote Code Execution Vulnerability (CVE-2021-27095, CVE-2021-28315)

- NTFS Elevation of Privilege Vulnerability (CVE-2021-27096)

- Windows Installer Spoofing Vulnerability (CVE-2021-26413)

- Windows Installer Elevation of Privilege Vulnerability (CVE-2021-26415, CVE-2021-28440)

- Windows Application Compatibility Cache Denial of Service Vulnerability (CVE-2021-28311)

- Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability (CVE-2021-28313, CVE-2021-28321, CVE-2021-28322)

- Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability (CVE-2021-28316)

- Microsoft Windows Codecs Library Information Disclosure Vulnerability (CVE-2021-28317)

- Windows GDI+ Information Disclosure Vulnerability (CVE-2021-28318)

- Windows TCP/IP Driver Denial of Service Vulnerability (CVE-2021-28319, CVE-2021-28439)

- Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability (CVE-2021-28320)

- Windows DNS Information Disclosure Vulnerability (CVE-2021-28323, CVE-2021-28328)

- Windows SMB Information Disclosure Vulnerability (CVE-2021-28325)

- Windows AppX Deployment Server Denial of Service Vulnerability (CVE-2021-28326)

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://support.microsoft.com/en-us/help/4009469
https://support.microsoft.com/en-us/help/4009470
https://support.microsoft.com/en-us/help/4009471
https://support.microsoft.com/en-us/help/4000825

* Platforms Affected:
Windows Server 2008 R2 SP1
Windows Server 2008 R2 x64 SP1
Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Windows 10
Windows Server 2016
Recommendation Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin April 2021 Microsoft security update at

https://support.microsoft.com/en-us/help/4009469
https://support.microsoft.com/en-us/help/4009470
https://support.microsoft.com/en-us/help/4009471
https://support.microsoft.com/en-us/help/4000825
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2021-26413,CVE-2021-26415,CVE-2021-27072,CVE-2021-27079,CVE-2021-27086,CVE-2021-27088,CVE-2021-27089,CVE-2021-27092,CVE-2021-27093 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)