REDLEGG BLOG

Critical Vulnerabilities Bulletin -August 2021

8/11/21 8:43 PM  |  by RedLegg Blog

Windows Update Medic Service Elevation of Privilege Vulnerability

Identifier: CVE-2021-36948

Exploit or POC: Yes.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36948

Description: CVE-2021-36948 allows an attacker with access to a host with the vulnerable component to elevate privileges. CVE-2021-36948 is actively being exploited in the wild.

Mitigation recommendation: Patching is currently the only method of mitigation.

Windows TCP/IP Remote Code Execution Vulnerability

Identifier: CVE-2021-26424

Exploit or POC: No.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26424

Description: CVE-2021-26424 allows an attacker with network access to remotely execute code via the TCP/IP stack in Windows.

Mitigation recommendation: Patching is currently the only method of mitigation.

Windows Services for NFS ONCRPC XDR Driver Remote Code Execution Vulnerability

Identifier: CVE-2021-26432

Exploit or POC: No.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26432

Description: CVE-2021-26432 allows an attacker with access to a host with the vulnerable ONCRPC XDR Driver to execute code.

Mitigation recommendation: Patching is currently the only method of mitigation.

Remote Desktop Client Remote Code Execution Vulnerability

Identifier: CVE-2021-34535

Exploit or POC: No.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34535

Description: CVE-2021-34535 allows an attacker with network access to remotely execute code via the RDC component of Windows.

Mitigation recommendation: Patching is currently the only method of mitigation.

Windows Print Spooler Remote Code Execution Vulnerability

Identifier: CVE-2021-36936, CVE-2021-36947

Exploit or POC: No.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36947

Description: CVE-2021-36936, CVE-2021-36947 allows an attacker with network access to execute code via the Windows Print Spooler component.

Mitigation recommendation: Patching is currently the only method of mitigation.

Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability

Identifier: CVE-2021-34524

Exploit or POC: No.

Update: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34524

Description: CVE-2021-34524 allows an attacker to remotely execute code via Microsoft Dynamic 365 on-premises.

Mitigation recommendation: Patching is currently the only method of mitigation.

Get Blog Updates

Related Articles

Critical Vulnerabilities Bulletin November 2021 96bravo

Critical Vulnerabilities Bulletin November 2021

Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability Identifier: CVE-2021-26443 Exploit or POC: ...
Critical Vulnerabilities Bulletin October 2021 96bravo

Critical Vulnerabilities Bulletin October 2021

Microsoft Exchange Server Remote Code Execution Vulnerability  Identifier: CVE-2021-26427 Exploit or POC: No. Update: ...
Critical Security Vulnerabilities Bulletin