First published: Tue Apr 13 2021(Updated: )
This vulnerability allows local attackers to write data to arbitrary files on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Windows Installer service. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of an administrator.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | =20H2 | |
Microsoft Windows Server | =1909 | |
Microsoft Windows 7 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows 7 | ||
Microsoft Windows Server | =2004 | |
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows RT | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows 8.1 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 10 | =20H2 | |
Windows 10 | =20H2 | |
Windows 10 | =20H2 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =1909 | |
Windows 10 | =1909 | |
Windows 10 | =1909 | |
Windows 10 | ||
Windows 10 | =1803 | |
Windows 10 | =1803 | |
Windows 10 | ||
Windows 10 | =2004 | |
Windows 10 | =2004 | |
Windows 10 | =2004 | |
Windows 10 | ||
Windows 10 | =20h2 | |
Windows 10 | =1607 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1909 | |
Windows 10 | =2004 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26415 is rated as a critical vulnerability due to its potential to allow local attackers to write data to arbitrary files.
To fix CVE-2021-26415, apply the latest security updates from Microsoft for your affected Windows version.
CVE-2021-26415 affects multiple versions of Microsoft Windows, including Windows 7, Windows 10, and various Windows Server editions.
CVE-2021-26415 requires local access to the system to exploit, meaning it cannot be exploited remotely without prior access.
Yes, Microsoft has released patches for CVE-2021-26415 that need to be installed on affected systems.