KB5001339: Windows 10 version 1803 Security Update (April 2021)

critical Nessus Plugin ID 148468
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host is missing one or more security updates.

Description

The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities:

- Win32k Elevation of Privilege Vulnerability (CVE-2021-27072, CVE-2021-28310)

- Windows Media Photo Codec Information Disclosure Vulnerability (CVE-2021-27079)

- Windows Event Tracing Elevation of Privilege Vulnerability (CVE-2021-27088)

- Microsoft Internet Messaging API Remote Code Execution Vulnerability (CVE-2021-27089)

- Azure AD Web Sign-in Security Feature Bypass Vulnerability (CVE-2021-27092)

- Windows Kernel Information Disclosure Vulnerability (CVE-2021-27093, CVE-2021-28309)

- Windows Early Launch Antimalware Driver Security Feature Bypass Vulnerability (CVE-2021-27094, CVE-2021-28447)

- Windows Media Video Decoder Remote Code Execution Vulnerability (CVE-2021-27095, CVE-2021-28315)

- NTFS Elevation of Privilege Vulnerability (CVE-2021-27096)

- Windows Installer Spoofing Vulnerability (CVE-2021-26413)

- Windows Installer Elevation of Privilege Vulnerability (CVE-2021-26415, CVE-2021-28440)

- Windows Application Compatibility Cache Denial of Service Vulnerability (CVE-2021-28311)

- Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability (CVE-2021-28313, CVE-2021-28321, CVE-2021-28322)

- Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability (CVE-2021-28316)

- Microsoft Windows Codecs Library Information Disclosure Vulnerability (CVE-2021-28317)

- Windows GDI+ Information Disclosure Vulnerability (CVE-2021-28318)

- Windows TCP/IP Driver Denial of Service Vulnerability (CVE-2021-28319, CVE-2021-28439)

- Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability (CVE-2021-28320)

- Windows DNS Information Disclosure Vulnerability (CVE-2021-28323, CVE-2021-28328)

- Windows SMB Information Disclosure Vulnerability (CVE-2021-28325)

- Windows AppX Deployment Server Denial of Service Vulnerability (CVE-2021-28326)

- Remote Procedure Call Runtime Remote Code Execution Vulnerability (CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434)

- Windows Speech Runtime Elevation of Privilege Vulnerability (CVE-2021-28347, CVE-2021-28351, CVE-2021-28436)

- Windows GDI+ Remote Code Execution Vulnerability (CVE-2021-28348, CVE-2021-28349, CVE-2021-28350)

- Windows Event Tracing Information Disclosure Vulnerability (CVE-2021-28435)

- Windows Installer Information Disclosure Vulnerability (CVE-2021-28437)

- Windows Console Driver Denial of Service Vulnerability (CVE-2021-28438, CVE-2021-28443)

- Windows TCP/IP Information Disclosure Vulnerability (CVE-2021-28442)

- Windows Hyper-V Security Feature Bypass Vulnerability (CVE-2021-28444)

- Windows Services and Controller App Elevation of Privilege Vulnerability (CVE-2021-27086)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Microsoft has released KB5001339 to address this issue.

See Also

https://support.microsoft.com/en-us/help/5001339

Plugin Details

Severity: Critical

ID: 148468

File Name: smb_nt_ms21_apr_5001339.nasl

Version: 1.12

Type: local

Agent: windows

Published: 4/13/2021

Updated: 11/30/2021

Dependencies: smb_check_rollup.nasl, smb_hotfixes.nasl, ms_bulletin_checks_possible.nasl

Risk Information

CVSS Score Source: CVE-2021-27092

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:POC/RL:OF/RC:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/13/2021

Vulnerability Publication Date: 3/30/2021

Reference Information

CVE: CVE-2021-26413, CVE-2021-26415, CVE-2021-27072, CVE-2021-27079, CVE-2021-27086, CVE-2021-27088, CVE-2021-27089, CVE-2021-27092, CVE-2021-27093, CVE-2021-27094, CVE-2021-27095, CVE-2021-27096, CVE-2021-28309, CVE-2021-28310, CVE-2021-28311, CVE-2021-28313, CVE-2021-28315, CVE-2021-28316, CVE-2021-28317, CVE-2021-28318, CVE-2021-28319, CVE-2021-28320, CVE-2021-28321, CVE-2021-28322, CVE-2021-28323, CVE-2021-28325, CVE-2021-28326, CVE-2021-28327, CVE-2021-28328, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28347, CVE-2021-28348, CVE-2021-28349, CVE-2021-28350, CVE-2021-28351, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434, CVE-2021-28435, CVE-2021-28436, CVE-2021-28437, CVE-2021-28438, CVE-2021-28439, CVE-2021-28440, CVE-2021-28442, CVE-2021-28443, CVE-2021-28444, CVE-2021-28447

MSKB: 5001339

MSFT: MS21-5001339

IAVA: 2021-A-0168-S, 2021-A-0431, 2021-A-0429