Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2021-31205

Опубликовано: 11 мая 2021
Источник: msrc
CVSS3: 6.5
EPSS Низкий

Описание

Windows SMB Client Security Feature Bypass Vulnerability

FAQ

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

Guest fallback access in SMB2 is not disabled by default. Installing this security update will disable guest fallback access to enforce the operating system edition settings and Group Policy settings. Guest fallback behavior default will return matching previously documented settings.

Alternatively, customers can manually disable guest access by configuring this registry value:

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanWorkstation\Parameters] "AllowInsecureGuestAuth"=dword:0

For more information on guest fallback access behaviors and default settings, refer to:

Guest access in SMB2 disabled by default in Windows

Обновления

ПродуктСтатьяОбновление
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows Server, version 2004 (Server Core installation)
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows Server, version 20H2 (Server Core Installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 87%
0.03238
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
около 4 лет назад

Windows SMB Client Security Feature Bypass Vulnerability

CVSS3: 4.3
github
около 3 лет назад

Windows SMB Client Security Feature Bypass Vulnerability

CVSS3: 4.3
fstec
около 4 лет назад

Уязвимость компонента SMB Client операционных систем Microsoft Windows, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 87%
0.03238
Низкий

6.5 Medium

CVSS3