Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2021-31956

Опубликовано: 08 июн. 2021
Источник: msrc
CVSS3: 7.8
EPSS Высокий

Описание

Windows NTFS Elevation of Privilege Vulnerability

FAQ

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

Yes

Latest Software Release

Exploitation Detected

Older Software Release

Exploitation Detected

DOS

N/A

EPSS

Процентиль: 99%
0.85551
Высокий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
около 4 лет назад

Windows NTFS Elevation of Privilege Vulnerability

CVSS3: 7.8
github
около 3 лет назад

Windows NTFS Elevation of Privilege Vulnerability

CVSS3: 7.8
fstec
около 4 лет назад

Уязвимость драйвера ntfs.sys операционных систем Windows, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 99%
0.85551
Высокий

7.8 High

CVSS3