Vulnerability

Microsoft Windows vulnerabilities

This blog contains information about the Microsoft Windows vulnerability. As soon as we have an update, we will add it to this post. More information about possible risks and details can be found at the bottom of this blog.

Clip path group@2x

T-Update

Information about vulnerabilities

This blog contains information about the Microsoft Windows vulnerability. As soon as we have an update, we will add it to this post. More information about possible risks and details can be found at the bottom of this blog.

Update May 17, 2021

20:00 | The vulnerabilities with attributes CVE-2021-31166 (CVSS 9.80) and CVE-2021-28476 (CVSS 9.90) have been rated “Critical” by Microsoft.

The vulnerability with attribute CVE-2021-31166 resides in the HTTP Protocol Stack. A remote malicious entity could exploit this vulnerability by sending specially prepared packets to the HTTP server to execute arbitrary code. Proof-of-Concept code was released for this vulnerability on 16-05-2021. The Proof-of-Concept code shows that it is possible to perform a Denial-of-Service.

The vulnerability with attribute CVE-2021-28476 resides in Hyper-V where a Hyper-V VM could force the Hyper-V host kernel to read an arbitrary, potentially invalid address. The content of the address will not reach the Hyper-V VM. In most cases this will lead to a Denial-of-Service of the Hyper-V host (bug check). Microsoft indicates that it is also possible to compromise the security of the Hyper-V host by reading the registry of specific attached peripherals.

Customized cyber security

Background

Characterisctics: Denial-of-Service (DoS) Manipulation of data Circumvention of security measure (Remote) code execution (Administrator / Root rights) Access to sensitive data Access to system data

Risk

Microsoft fixes multiple vulnerabilities in Windows.

A malicious entity could potentially exploit the vulnerabilities to:

  • Cause a Denial of Service,
  • Bypass security measures,
  • Run arbitrary code,
  • Obtain increased rights,
  • To gain access to sensitive data,
  • To pretend to be another user.

The vulnerabilities with attributes CVE-2021-31166 (CVSS 9.80) and CVE-2021-28476 (CVSS 9.90) have been rated “Critical” by Microsoft.

The vulnerability with attribute CVE-2021-31166 resides in the HTTP Protocol Stack. A remote malicious entity could exploit this vulnerability by sending specially prepared packets to the HTTP server to execute arbitrary code. Proof-of-Concept code was released for this vulnerability on 16-05-2021. The Proof-of-Concept code shows that it is possible to perform a Denial-of-Service.

The vulnerability with attribute CVE-2021-28476 resides in Hyper-V where a Hyper-V VM could force the Hyper-V host kernel to read an arbitrary, potentially invalid address. The content of the address will not reach the Hyper-V VM. In most cases this will lead to a Denial-of-Service of the Hyper-V host (bug check). Microsoft indicates that it is also possible to compromise the security of the Hyper-V host by reading the registry of specific attached peripherals.

Below is an overview of the various vulnerabilities described per component and their impact:

Jet Red and Access Connectivity:

CVE-ID: CVE-2021-28455
CVSS: 8,80
Impact:
Arbitrary code execution

Windows RDP Client:

CVE-ID: CVE-2021-31186

CVSS: 7,40

Impact: Access to sensitive data


Windows SMB:

CVE-ID: CVE-2021-31205
CVSS: 4,30
Impact
: Circumvention of security measure


Microsoft Bluetooth Driver:

CVE-ID: CVE-2021-31182
CVSS: 7,10
Impact
: Present as another user


Windows Container Isolation FS Filter Driver:

CVE-ID: CVE-2021-31190
CVSS: 7,80
Impact
: Obtaining Increased Rights


Windows Container Manager Service:

CVE-ID: CVE-2021-31165CVE-2021-31167
CVE-2021-31168
CVE-2021-31169
CVE-2021-31208

CVSS: all 7,80
Impact: all
obtaining Increased Rights

HTTP.sys:

CVE-ID: CVE-2021-31166
CVSS: 9,80
Impact
: Arbitrary code execution



Role: Hyper-V:

CVE-ID: CVE-2021-28476
CVSS: 9,90
Impact
: Arbitrary code execution

Windows SSDP Service:

CVE-ID: CVE-2021-31193
CVSS: 7,80
Impact
: Obtaining Increased Rights


Microsoft Windows IrDA:

CVE-ID: CVE-2021-31184
CVSS: 5,40
Impact
: Access to sensitive data


Windows Wireless Networking:

CVE-ID: CVE-2020-24588
CVE-2020-26144

CVSS: both 6,50
Impact
: Both present as another user

CVE-ID: CVE-2020-24587
CVSS
 6,50
Impact: Access to sensitive data

Windows Projected File System FS Filter:

CVE-ID: CVE-2021-31191

CVSS: 5,50

Impact:Access to sensitive data

Windows OLE:

CVE-ID: CVE-2021-31194

CVSS: 7,80

Impact: Arbitrary code execution

Windows WalletService:

CVE-ID: CVE-2021-31187
CVSS: 7,80
Impact
: Obtaining Increased Rights

Windows Desktop Bridge:

CVE-ID: CVE-2021-31185
CVSS: 5,50
Impact
: Denial-of-Service

Windows CSC Service:

CVE-ID: CVE-2021-28479
CVSS: 5,50
Impact
: Access to sensitive data

Microsoft Windows Codecs Library:

CVE-ID: CVE-2021-31192
CVE-2021-28465

CVSS: both 7,80

Impact: Both arbitrary code execution

Microsoft Graphics Component:

CVE-ID: CVE-2021-31170
CVE-2021-31188

CVSS: both 7,80
Impact: 
both obtaining Increased Rights

Advice

Microsoft has released updates that address the vulnerabilities described. We recommend that you install these updates. More information about the vulnerabilities, the installation of the updates and any workarounds, see the Microsoft website.

Sources

Ellipse 6

Sign up to receive T-Updates

Receive the latest vulnerabilities in your email every Wednesday

More than 1,000 organisations have already joined us.

Tesorion gebruikt jouw gegevens voor het versturen van de gevraagde informatie. Daarnaast worden je gegevens mogelijk gebruikt voor commerciële opvolging. Je kunt je op elk gewenst moment hiervoor afmelden via de link in de e-mail. Lees voor meer informatie ons privacybeleid.

Ellipse 6