REDLEGG BLOG

Critical Vulnerabilities Bulletin -August 2021

8/11/21 8:43 PM  |  by RedLegg Blog

Windows Update Medic Service Elevation of Privilege Vulnerability

Identifier: CVE-2021-36948

Exploit or POC: Yes.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36948

Description: CVE-2021-36948 allows an attacker with access to a host with the vulnerable component to elevate privileges. CVE-2021-36948 is actively being exploited in the wild.

Mitigation recommendation: Patching is currently the only method of mitigation.

Windows TCP/IP Remote Code Execution Vulnerability

Identifier: CVE-2021-26424

Exploit or POC: No.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26424

Description: CVE-2021-26424 allows an attacker with network access to remotely execute code via the TCP/IP stack in Windows.

Mitigation recommendation: Patching is currently the only method of mitigation.

Windows Services for NFS ONCRPC XDR Driver Remote Code Execution Vulnerability

Identifier: CVE-2021-26432

Exploit or POC: No.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26432

Description: CVE-2021-26432 allows an attacker with access to a host with the vulnerable ONCRPC XDR Driver to execute code.

Mitigation recommendation: Patching is currently the only method of mitigation.

Remote Desktop Client Remote Code Execution Vulnerability

Identifier: CVE-2021-34535

Exploit or POC: No.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34535

Description: CVE-2021-34535 allows an attacker with network access to remotely execute code via the RDC component of Windows.

Mitigation recommendation: Patching is currently the only method of mitigation.

Windows Print Spooler Remote Code Execution Vulnerability

Identifier: CVE-2021-36936, CVE-2021-36947

Exploit or POC: No.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36947

Description: CVE-2021-36936, CVE-2021-36947 allows an attacker with network access to execute code via the Windows Print Spooler component.

Mitigation recommendation: Patching is currently the only method of mitigation.

Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability

Identifier: CVE-2021-34524

Exploit or POC: No.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34524

Description: CVE-2021-34524 allows an attacker to remotely execute code via Microsoft Dynamic 365 on-premises.

Mitigation recommendation: Patching is currently the only method of mitigation.

Get Blog Updates

Related Articles

Emergency Vulnerability Bulletin - 09/30/22 96bravo

Emergency Vulnerability Bulletin - 09/30/22

Atlassian Bitbucket Server and Data Center Vulnerability Identifier: CVE-2022-36804 Exploit or POC: Yes (Actively Being ...
Emergency Vulnerability Bulletin - 09/30/22 96bravo

Emergency Vulnerability Bulletin - 09/30/22

Microsoft Exchange Server Server-Side Request Forgery (SSRF) Vulnerability Identifier: CVE-2022-41040 Exploit or POC: ...
Critical Security Vulnerabilities Bulletin