First published: Tue Apr 13 2021(Updated: )
Windows GDI+ Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28348, CVE-2021-28349.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28350 has a critical severity rating due to its potential to allow remote code execution.
To fix CVE-2021-28350, users should apply the latest security updates provided by Microsoft for affected Windows versions.
CVE-2021-28350 affects various versions of Windows, including Windows 10, Windows 7, Windows 8.1, and multiple server versions.
CVE-2021-28350 can be exploited via specially crafted images that trigger remote code execution on the vulnerable system.
While applying patches is recommended, temporary workarounds may involve disabling certain features or restricting the use of specific image files until a fix is applied.