Security Update for Microsoft Windows Admin Center (March 2021)

medium Nessus Plugin ID 147420

Synopsis

The remote Windows host is contains an application that is affected by a security feature bypass vulnerability.

Description

The remote Windows host is running a version of Microsoft Windows Admin Center that is missing a security update. It is, therefore, affected by a security feature bypass vulnerability. An authenticated, remote attacker can exploit this to bypass security features.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Apply the appropriate update referenced in the Microsoft advisory.

See Also

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27066

http://www.nessus.org/u?0fbee7f5

Plugin Details

Severity: Medium

ID: 147420

File Name: windows_admin_center_ms21_mar.nasl

Version: 1.2

Type: local

Agent: windows

Family: Windows

Published: 3/10/2021

Updated: 3/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS Score Source: CVE-2021-27066

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:windows_admin_center

Required KB Items: installed_sw/Windows Admin Center

Exploit Ease: No known exploits are available

Patch Publication Date: 3/2/2021

Vulnerability Publication Date: 3/9/2021

Reference Information

CVE: CVE-2021-27066