KB5001342: Windows 10 version 1809 / Windows Server 2019 Security Update (Apr 2021)

critical Nessus Plugin ID 148473

Synopsis

The remote host is missing one or more security updates.

Description

The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities:

- Win32k Elevation of Privilege Vulnerability (CVE-2021-27072, CVE-2021-28310)

- Windows Media Photo Codec Information Disclosure Vulnerability (CVE-2021-27079)

- Windows Event Tracing Elevation of Privilege Vulnerability (CVE-2021-27088)

- Microsoft Internet Messaging API Remote Code Execution Vulnerability (CVE-2021-27089)

- Azure AD Web Sign-in Security Feature Bypass Vulnerability (CVE-2021-27092)

- Windows Kernel Information Disclosure Vulnerability (CVE-2021-27093, CVE-2021-28309)

- Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability (CVE-2021-27094, CVE-2021-28447)

- Windows Media Video Decoder Remote Code Execution Vulnerability (CVE-2021-27095, CVE-2021-28315)

- NTFS Elevation of Privilege Vulnerability (CVE-2021-27096)

- Windows Installer Spoofing Vulnerability (CVE-2021-26413)

- Windows Installer Elevation of Privilege Vulnerability (CVE-2021-26415, CVE-2021-28440)

- Windows Hyper-V Denial of Service Vulnerability (CVE-2021-26416)

- Windows Overlay Filter Information Disclosure Vulnerability (CVE-2021-26417)

- Windows Application Compatibility Cache Denial of Service Vulnerability (CVE-2021-28311)

- Windows NTFS Denial of Service Vulnerability (CVE-2021-28312)

- Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability (CVE-2021-28313, CVE-2021-28321, CVE-2021-28322)

- Windows Hyper-V Elevation of Privilege Vulnerability (CVE-2021-28314)

- Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability (CVE-2021-28316)

- Microsoft Windows Codecs Library Information Disclosure Vulnerability (CVE-2021-28317)

- Windows GDI+ Information Disclosure Vulnerability (CVE-2021-28318)

- Windows TCP/IP Driver Denial of Service Vulnerability (CVE-2021-28319, CVE-2021-28439)

- Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability (CVE-2021-28320)

- Windows DNS Information Disclosure Vulnerability (CVE-2021-28323, CVE-2021-28328)

- Windows SMB Information Disclosure Vulnerability (CVE-2021-28325)

- Windows AppX Deployment Server Denial of Service Vulnerability (CVE-2021-28326)

- Remote Procedure Call Runtime Remote Code Execution Vulnerability (CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434)

- Windows Speech Runtime Elevation of Privilege Vulnerability (CVE-2021-28347, CVE-2021-28351, CVE-2021-28436)

- Windows GDI+ Remote Code Execution Vulnerability (CVE-2021-28348, CVE-2021-28349, CVE-2021-28350)

- Windows Event Tracing Information Disclosure Vulnerability (CVE-2021-28435)

- Windows Installer Information Disclosure Vulnerability (CVE-2021-28437)

- Windows Console Driver Denial of Service Vulnerability (CVE-2021-28438, CVE-2021-28443)

- Windows Hyper-V Information Disclosure Vulnerability (CVE-2021-28441)

- Windows TCP/IP Information Disclosure Vulnerability (CVE-2021-28442)

- Windows Hyper-V Security Feature Bypass Vulnerability (CVE-2021-28444)

- N/A (CVE-2021-28445, CVE-2021-28446)

- Windows Services and Controller App Elevation of Privilege Vulnerability (CVE-2021-27086)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Microsoft has released KB5001342 to address this issue.

See Also

https://support.microsoft.com/en-us/help/5001342

Plugin Details

Severity: Critical

ID: 148473

File Name: smb_nt_ms21_apr_5001342.nasl

Version: 1.19

Type: local

Agent: windows

Published: 4/13/2021

Updated: 11/29/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-27092

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows_server_2019, cpe:/o:microsoft:windows_10_1809

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/13/2021

Vulnerability Publication Date: 3/30/2021

CISA Known Exploited Vulnerability Due Dates: 11/17/2021

Reference Information

CVE: CVE-2021-26413, CVE-2021-26415, CVE-2021-26416, CVE-2021-26417, CVE-2021-27072, CVE-2021-27079, CVE-2021-27086, CVE-2021-27088, CVE-2021-27089, CVE-2021-27092, CVE-2021-27093, CVE-2021-27094, CVE-2021-27095, CVE-2021-27096, CVE-2021-28309, CVE-2021-28310, CVE-2021-28311, CVE-2021-28312, CVE-2021-28313, CVE-2021-28314, CVE-2021-28315, CVE-2021-28316, CVE-2021-28317, CVE-2021-28318, CVE-2021-28319, CVE-2021-28320, CVE-2021-28321, CVE-2021-28322, CVE-2021-28323, CVE-2021-28325, CVE-2021-28326, CVE-2021-28327, CVE-2021-28328, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28347, CVE-2021-28348, CVE-2021-28349, CVE-2021-28350, CVE-2021-28351, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434, CVE-2021-28435, CVE-2021-28436, CVE-2021-28437, CVE-2021-28438, CVE-2021-28439, CVE-2021-28440, CVE-2021-28441, CVE-2021-28442, CVE-2021-28443, CVE-2021-28444, CVE-2021-28445, CVE-2021-28446, CVE-2021-28447

IAVA: 2021-A-0168-S, 2021-A-0171-S, 2021-A-0429-S, 2021-A-0431-S

MSFT: MS21-5001342

MSKB: 5001342