First published: Tue Apr 13 2021(Updated: )
Remote Procedure Call Runtime Remote Code Execution Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28434 is classified as a critical severity vulnerability, posing a significant risk of remote code execution.
To fix CVE-2021-28434, ensure that your system is updated with the latest security patches provided by Microsoft.
CVE-2021-28434 affects various versions of Microsoft Windows, including Windows 10, Windows 7, Windows 8.1, and several Windows Server editions.
CVE-2021-28434 can be exploited through specially crafted RPC requests, allowing attackers to execute arbitrary code remotely.
While the best solution is to apply patches, minimizing exposure to untrusted networks may serve as a temporary workaround for CVE-2021-28434.