VID |
26853 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
Microsoft Security Update for April 2021 is not installed. The remote Windows host is missing a security update.
- Win32k Elevation of Privilege Vulnerability (CVE-2021-27072, CVE-2021-28310)
- Windows Media Photo Codec Information Disclosure Vulnerability (CVE-2021-27079)
- Windows Event Tracing Elevation of Privilege Vulnerability (CVE-2021-27088)
- Microsoft Internet Messaging API Remote Code Execution Vulnerability (CVE-2021-27089)
- Azure AD Web Sign-in Security Feature Bypass Vulnerability (CVE-2021-27092)
- Windows Kernel Information Disclosure Vulnerability (CVE-2021-27093, CVE-2021-28309)
- Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability (CVE-2021-27094, CVE-2021-28447)
- Windows Media Video Decoder Remote Code Execution Vulnerability (CVE-2021-27095, CVE-2021-28315)
- NTFS Elevation of Privilege Vulnerability (CVE-2021-27096)
- Windows Installer Spoofing Vulnerability (CVE-2021-26413)
- Windows Installer Elevation of Privilege Vulnerability (CVE-2021-26415, CVE-2021-28440)
- Windows Application Compatibility Cache Denial of Service Vulnerability (CVE-2021-28311)
- Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability (CVE-2021-28313, CVE-2021-28321, CVE-2021-28322)
- Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability (CVE-2021-28316)
- Microsoft Windows Codecs Library Information Disclosure Vulnerability (CVE-2021-28317)
- Windows GDI+ Information Disclosure Vulnerability (CVE-2021-28318)
- Windows TCP/IP Driver Denial of Service Vulnerability (CVE-2021-28319, CVE-2021-28439)
- Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability (CVE-2021-28320)
- Windows DNS Information Disclosure Vulnerability (CVE-2021-28323, CVE-2021-28328)
- Windows SMB Information Disclosure Vulnerability (CVE-2021-28325)
- Windows AppX Deployment Server Denial of Service Vulnerability (CVE-2021-28326)
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://support.microsoft.com/en-us/help/4009469 https://support.microsoft.com/en-us/help/4009470 https://support.microsoft.com/en-us/help/4009471 https://support.microsoft.com/en-us/help/4000825
* Platforms Affected: Windows Server 2008 R2 SP1 Windows Server 2008 R2 x64 SP1 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows 10 Windows Server 2016 |
Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin April 2021 Microsoft security update at
https://support.microsoft.com/en-us/help/4009469 https://support.microsoft.com/en-us/help/4009470 https://support.microsoft.com/en-us/help/4009471 https://support.microsoft.com/en-us/help/4000825 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2021-26413,CVE-2021-26415,CVE-2021-27072,CVE-2021-27079,CVE-2021-27086,CVE-2021-27088,CVE-2021-27089,CVE-2021-27092,CVE-2021-27093 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|