7.8
CVE-2021-43226
- EPSS 38%
- Veröffentlicht 15.12.2021 15:15:09
- Zuletzt bearbeitet 07.10.2025 13:45:14
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.19145
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.19145
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.4825
Microsoft ≫ Windows 10 1607 HwPlatformx86 Version < 10.0.14393.4825
Microsoft ≫ Windows 10 1809 Version < 10.0.17763.2366
Microsoft ≫ Windows 10 1909 Version < 10.0.18363.1977
Microsoft ≫ Windows 10 2004 Version < 10.0.19041.1415
Microsoft ≫ Windows 10 20h2 HwPlatformarm64 Version < 10.0.19042.1415
Microsoft ≫ Windows 10 20h2 HwPlatformx86 Version < 10.0.19042.1415
Microsoft ≫ Windows 10 21h1 Version < 10.0.19043.1415
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.1415
Microsoft ≫ Windows 11 21h2 Version < 10.0.22000.376
Microsoft ≫ Windows 8.1 Version-
Microsoft ≫ Windows Rt 8.1 Version-
Microsoft ≫ Windows Server 2004 Version < 10.0.19041.1415
Microsoft ≫ Windows Server 2008 Version- Updatesp2 HwPlatformx64
Microsoft ≫ Windows Server 2008 Version- Updatesp2 HwPlatformx86
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.4825
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.2366
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.405
Microsoft ≫ Windows Server 20h2 Version < 10.0.19042.1415
06.10.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog
Microsoft Windows Privilege Escalation Vulnerability
SchwachstelleMicrosoft Windows Common Log File System Driver contains a privilege escalation vulnerability that could allow a local, privileged attacker to bypass certain security mechanisms.
BeschreibungApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 38% | 0.971 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 4.6 | 3.9 | 6.4 |
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
secure@microsoft.com | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|