First published: Tue Jan 12 2021(Updated: )
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | =1909 | |
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server | =2004 | |
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server | =20H2 | |
Microsoft Windows RT | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows 8.1 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Windows 10 | =20H2 | |
Windows 10 | =20H2 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =1909 | |
Windows 10 | =1909 | |
Windows 10 | =1909 | |
Windows 10 | ||
Windows 10 | =1803 | |
Windows 10 | =1803 | |
Windows 10 | ||
Windows 10 | =2004 | |
Windows 10 | =2004 | |
Windows 10 | =2004 | |
Windows 10 | ||
Windows 10 | ||
Windows 10 | =20h2 | |
Windows 10 | =1607 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1909 | |
Windows 10 | =2004 | |
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1710 is rated as critical due to its potential for remote code execution.
To fix CVE-2021-1710, apply the latest security updates provided by Microsoft for the affected versions of Windows.
CVE-2021-1710 affects several versions of Windows including Windows 10, Windows 8.1, and various Windows Server editions.
Yes, CVE-2021-1710 allows an attacker to execute arbitrary code on the affected system through crafted media files.
If unable to patch, ensure that your systems are behind firewalls and that only trusted media files are used until a patch is applied.