First published: Thu Mar 11 2021(Updated: )
Windows DNS Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26877, CVE-2021-26893, CVE-2021-26894, CVE-2021-26897.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26895 has a critical severity rating, allowing for remote code execution.
To mitigate CVE-2021-26895, apply the appropriate security patch provided by Microsoft.
CVE-2021-26895 affects various versions of Windows Server, including 2008, 2012, 2016, and 2019.
CVE-2021-26895 is classified as a remote code execution vulnerability in Windows DNS Server.
Exploitation of CVE-2021-26895 could allow an attacker to execute arbitrary code on the targeted system.