First published: Tue Apr 13 2021(Updated: )
Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
=20h2 | ||
=1607 | ||
=1803 | ||
=1809 | ||
=1909 | ||
=2004 | ||
=sp1 | ||
=r2-sp1 | ||
=r2 | ||
=20h2 | ||
=1909 | ||
=2004 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT 8.1 | ||
Microsoft Windows Server 2008 | =r2-sp1 | |
Microsoft Windows Server 2012 | ||
Microsoft Windows Server 2012 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28316 is a vulnerability in the Windows WLAN AutoConfig Service that allows security features to be bypassed.
Microsoft Windows 10, Windows 7, Windows 8.1, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows Server 2016, and Windows Server 2019 are affected by CVE-2021-28316.
CVE-2021-28316 has a severity rating of 4.6 (medium).
CVE-2021-28316 allows attackers to bypass security features in the Windows WLAN AutoConfig Service.
Yes, Microsoft has released a security update to address CVE-2021-28316. It is recommended to install the latest updates to protect against this vulnerability.