First published: Wed Jul 14 2021(Updated: )
Windows DNS Snap-in Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33749, CVE-2021-33750, CVE-2021-33752.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =20h2 | |
Windows 10 | =21h1 | |
Windows 10 | =1809 | |
Windows 10 | =1909 | |
Windows 10 | =2004 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33756 has a severity rating of Critical, allowing remote code execution.
To fix CVE-2021-33756, apply the latest security updates provided by Microsoft for affected Windows versions.
CVE-2021-33756 affects various versions of Windows, including Windows 10, Windows Server, Windows 7, and Windows 8.1.
Yes, CVE-2021-33756 can be exploited remotely, which increases the risk of unauthorized access.
If your system is vulnerable to CVE-2021-33756, it is critical to patch the vulnerability immediately to prevent potential exploitation.