高危 Windows User Profile Service 的特权提升漏洞
CVE编号
CVE-2021-34484利用情况
暂无补丁情况
官方补丁披露时间
2021-08-10漏洞描述
Microsoft Windows是一款由美国微软公司开发的窗口化操作系统。 Microsoft Windows User Profile Service存在权限提升漏洞。攻击者可利用该漏洞提升权限。 受影响系统: Microsoft Windows Server 20H2 (Server Core Insta Microsoft Windows Server 2019 (Server Core Insta Microsoft Windows Server 2019 Microsoft Windows Server 2016 (Server Core Insta Microsoft Windows Server 2016 Microsoft Windows Server 2012 R2 (Server Core in Microsoft Windows Server 2012 R2 Microsoft Windows Server 2012 (Server Core insta Microsoft Windows Server 2012 Microsoft Windows Server 2008 R2 for x64-based S Microsoft Windows Server 2008 R2 for x64-based S Microsoft Windows Server 2008 for x64-based Syst Microsoft Windows Server 2008 for x64-based Syst Microsoft Windows Server 2008 for 32-bit Systems Microsoft Windows Server 2008 for 32-bit Systems Microsoft Windows Server 2004 (Server Core insta Microsoft Windows RT 8.1 Microsoft Windows 8.1 for x64-based systems Microsoft Windows 8.1 for 32-bit systems Microsoft Windows 7 for x64-based Systems SP1 Microsoft Windows 7 for 32-bit Systems SP1 Microsoft Windows 10 for x64-based Systems Microsoft Windows 10 for 32-bit Systems Microsoft Windows 10 21H1 for x64-based Systems Microsoft Windows 10 21H1 for ARM64-based Systems Microsoft Windows 10 21H1 for 32-bit Systems Microsoft Windows 10 20H2 for x64-based Systems Microsoft Windows 10 20H2 for ARM64-based Systems Microsoft Windows 10 20H2 for 32-bit Systems Microsoft Windows 10 2004 for x64-based Systems Microsoft Windows 10 2004 for ARM64-based Systems Microsoft Windows 10 2004 for 32-bit Systems Microsoft Windows 10 1909 for x64-based Systems Microsoft Windows 10 1909 for ARM64-based Systems Microsoft Windows 10 1909 for 32-bit Systems Microsoft Windows 10 1809 for x64-based Systems Microsoft Windows 10 1809 for ARM64-based Systems Microsoft Windows 10 1809 for 32-bit Systems Microsoft Windows 10 1607 for x64-based Systems Microsoft Windows 10 1607 for 32-bit Systems解决建议
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34484
参考链接 |
|
---|---|
http://www.nsfocus.net/vulndb/57507 | |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34484 | |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34484 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | microsoft | windows_10 | - | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_10 | 1607 | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_10 | 1809 | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_10 | 1909 | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_10 | 2004 | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_10 | 20h2 | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_10 | 21h1 | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_7 | - | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_8.1 | - | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_rt_8.1 | - | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_server_2008 | - | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_server_2008 | r2 | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_server_2012 | - | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_server_2012 | r2 | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_server_2016 | - | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_server_2016 | 2004 | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_server_2016 | 20h2 | - | |||||
运行在以下环境 | |||||||||
系统 | microsoft | windows_server_2019 | - | - | |||||
- 攻击路径 远程
- 攻击复杂度 困难
- 权限要求 无需权限
- 影响范围 越权影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
CWE-ID | 漏洞类型 |
CWE-269 | 特权管理不恰当 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论