First published: Thu Feb 25 2021(Updated: )
Windows Fax Service Remote Code Execution Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-24077 is classified as critical, as it allows remote code execution.
To fix CVE-2021-24077, apply the latest security updates from Microsoft for the affected Windows versions.
CVE-2021-24077 affects multiple versions of Windows, including Windows 7, 8.1, 10, and several Windows Server versions.
CVE-2021-24077 can allow an attacker to execute arbitrary code on the affected system, potentially compromising its security.
While applying updates is the best solution, disabling the Windows Fax Service can serve as a temporary workaround to mitigate the vulnerability.