Language:
Severity: High
ID: 154029
File Name: smb_nt_ms21_oct_5006699.nasl
Version: 1.14
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 10/12/2021
Updated: 6/17/2024
Supported Sensors: Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.7
Risk Factor: High
Base Score: 7.2
Temporal Score: 6.3
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2021-41345
Risk Factor: High
Base Score: 8.8
Temporal Score: 8.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2021-36970
CPE: cpe:/o:microsoft:windows_server_2022
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 10/12/2021
Vulnerability Publication Date: 10/12/2021
CISA Known Exploited Vulnerability Due Dates: 12/1/2021, 5/16/2022
Core Impact
Metasploit (Win32k NtGdiResetDC Use After Free Local Privilege Elevation)
CVE: CVE-2021-26441, CVE-2021-26442, CVE-2021-36953, CVE-2021-36970, CVE-2021-38662, CVE-2021-38663, CVE-2021-38672, CVE-2021-40443, CVE-2021-40449, CVE-2021-40450, CVE-2021-40454, CVE-2021-40455, CVE-2021-40456, CVE-2021-40460, CVE-2021-40461, CVE-2021-40462, CVE-2021-40463, CVE-2021-40464, CVE-2021-40465, CVE-2021-40466, CVE-2021-40467, CVE-2021-40468, CVE-2021-40469, CVE-2021-40470, CVE-2021-40475, CVE-2021-40476, CVE-2021-40477, CVE-2021-40478, CVE-2021-40488, CVE-2021-40489, CVE-2021-41332, CVE-2021-41334, CVE-2021-41336, CVE-2021-41337, CVE-2021-41338, CVE-2021-41339, CVE-2021-41340, CVE-2021-41342, CVE-2021-41343, CVE-2021-41345, CVE-2021-41347, CVE-2021-41357, CVE-2021-41361