Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-42291— Active Directory Domain Services Elevation of Privilege Vulnerability

CVSS 7.5 · High EPSS 1.24% · P79
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-42291

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Active Directory Domain Services Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Active Directory Domain Services Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Active Directory 权限许可和访问控制问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows Active Directory是美国微软(Microsoft)公司的一个负责架构中大型网络环境的集中式目录管理服务。存储有关网络上对象的信息,并使管理员和用户可以轻松查找和使用这些信息。 Microsoft Windows Active Directory存在权限许可和访问控制问题漏洞。以下产品和版本受到影响:Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installati
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftWindows Server 2019 10.0.0 ~ 10.0.17763.2300 cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2300:*:*:*:*:*:*:*
MicrosoftWindows Server 2019 (Server Core installation) 10.0.0 ~ 10.0.17763.2300 cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2300:*:*:*:*:*:*:*
MicrosoftWindows Server 2022 10.0.0 ~ 10.0.20348.350 cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.350:*:*:*:*:*:*:*
MicrosoftWindows Server version 2004 10.0.0 ~ 10.0.19041.1348 cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1348:*:*:*:*:*:*:*
MicrosoftWindows Server version 20H2 10.0.0 ~ 10.0.19041.1348 cpe:2.3:o:microsoft:windows_server_20H2:10.0.19041.1348:*:*:*:*:*:*:*
MicrosoftWindows Server 2016 10.0.0 ~ 10.0.14393.4770 cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4770:*:*:*:*:*:*:*
MicrosoftWindows Server 2016 (Server Core installation) 10.0.0 ~ 10.0.14393.4770 cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4770:*:*:*:*:*:*:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ 6.0.6003.21282 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21282:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.0 ~ 6.0.6003.21282 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21282:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ 6.0.6003.21282 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21282:*:*:*:*:*:x86:*
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.0 ~ 6.1.7601.25769 cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25769:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.0.0 ~ 6.1.7601.25769 cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25769:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 6.2.0 ~ 6.2.9200.23517 cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23517:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 (Server Core installation) 6.2.0 ~ 6.2.9200.23517 cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23517:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 6.3.0 ~ 6.3.9600.20174 cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20174:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.0 ~ 6.3.9600.20174 cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20174:*:*:*:*:*:x64:*

II. Public POCs for CVE-2021-42291

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-42291

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2021-11-10 · 54 CVEs total

CVE-2021-264439.0 CRITICALMicrosoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
CVE-2021-386668.8 HIGHRemote Desktop Client Remote Code Execution Vulnerability
CVE-2021-423218.8 HIGHMicrosoft Exchange Server Remote Code Execution Vulnerability
CVE-2021-423168.8 HIGHMicrosoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
CVE-2021-422838.8 HIGHNTFS Elevation of Privilege Vulnerability
CVE-2021-422758.8 HIGHMicrosoft COM for Windows Remote Code Execution Vulnerability
CVE-2021-432097.8 HIGH3D Viewer Remote Code Execution Vulnerability
CVE-2021-432087.8 HIGH3D Viewer Remote Code Execution Vulnerability
CVE-2021-422967.8 HIGHMicrosoft Word Remote Code Execution Vulnerability
CVE-2021-423227.8 HIGHVisual Studio Code Elevation of Privilege Vulnerability
CVE-2021-422867.8 HIGHWindows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege
CVE-2021-422857.8 HIGHWindows Kernel Elevation of Privilege Vulnerability
CVE-2021-422767.8 HIGHMicrosoft Windows Media Foundation Remote Code Execution Vulnerability
CVE-2021-413787.8 HIGHWindows NTFS Remote Code Execution Vulnerability
CVE-2021-413777.8 HIGHWindows Fast FAT File System Driver Elevation of Privilege Vulnerability
CVE-2021-413707.8 HIGHNTFS Elevation of Privilege Vulnerability
CVE-2021-413677.8 HIGHNTFS Elevation of Privilege Vulnerability
CVE-2021-413667.8 HIGHCredential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerabili
CVE-2021-404427.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2021-369577.8 HIGHWindows Desktop Bridge Elevation of Privilege Vulnerability

Showing top 20 of 54 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-42291

No comments yet


Leave a comment