Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2021-43226
Key Information:
- Vendor
Microsoft
- Status
- Vendor
- CVE Published:
- 15 December 2021
Badges
What is CVE-2021-43226?
The Windows Common Log File System Driver is susceptible to an elevation of privilege vulnerability that could allow an authenticated attacker to execute arbitrary code with elevated privileges. This flaw arises due to improper handling of objects in memory, and it can be exploited by executing a specially crafted application. Successful exploitation may result in the attacker being able to take control of the affected system, potentially compromising the integrity and security of sensitive information.
CISA has reported CVE-2021-43226
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2021-43226 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Affected Version(s)
Windows 10 Version 1507 32-bit Systems 10.0.0 < 10.0.10240.19145
Windows 10 Version 1607 32-bit Systems 10.0.0 < 10.0.14393.4825
Windows 10 Version 1809 32-bit Systems 10.0.0 < 10.0.17763.2366
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
38% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🦅
CISA Reported
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved