First published: Tue Mar 09 2021(Updated: )
Windows Update Stack Elevation of Privilege Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | =2004 | |
Microsoft Windows Server | =1909 | |
Microsoft Windows Server | =20H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 10 | =20H2 | |
Windows 10 | =20H2 | |
Windows 10 | =20H2 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1909 | |
Windows 10 | =1909 | |
Windows 10 | =1909 | |
Windows 10 | =1803 | |
Windows 10 | =1803 | |
Windows 10 | =2004 | |
Windows 10 | =2004 | |
Windows 10 | =2004 | |
Windows 10 | =20h2 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1909 | |
Windows 10 | =2004 | |
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26889 is classified as a critical privilege escalation vulnerability.
To fix CVE-2021-26889, you should apply the latest security updates provided by Microsoft.
CVE-2021-26889 affects various versions of Windows 10 and Windows Server, specifically version 20H2 and others identified in the advisory.
CVE-2021-26889 requires local access for exploitation, making it less likely to be executed remotely.
If immediate patching is not possible, limit local access to affected systems as a temporary mitigation for CVE-2021-26889.