First published: Tue Jan 12 2021(Updated: )
Windows Kernel Elevation of Privilege Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | =2004 | |
Microsoft Windows Server | =1909 | |
Microsoft Windows Server | =20H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 10 | =20H2 | |
Windows 10 | =20H2 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1909 | |
Windows 10 | =1909 | |
Windows 10 | =1909 | |
Windows 10 | =1803 | |
Windows 10 | =1803 | |
Windows 10 | =2004 | |
Windows 10 | =2004 | |
Windows 10 | =2004 | |
Windows 10 | =20h2 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1909 | |
Windows 10 | =2004 | |
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1682 has been rated with a high severity level, allowing attackers to elevate privileges within the Windows operating system.
To fix CVE-2021-1682, apply the patches provided by Microsoft linked to the CVE, which is included in their security updates.
CVE-2021-1682 affects specific versions of Windows 10 and Windows Server, including versions 1803, 1809, 2004, 20H2, and 1909.
Microsoft has not provided a specific workaround for CVE-2021-1682, so patching the affected systems is recommended.
CVE-2021-1682 is classified as an elevation of privilege vulnerability within the Windows kernel.