First published: Wed Jul 14 2021(Updated: )
Windows Security Account Manager Remote Protocol Security Feature Bypass Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =20h2 | |
Windows 10 | =21h1 | |
Windows 10 | =1607 | |
Windows 10 | =1809 | |
Windows 10 | =1909 | |
Windows 10 | =2004 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33757 has been classified as a security feature bypass vulnerability.
To mitigate CVE-2021-33757, ensure that your Windows software is updated with the latest security patches from Microsoft.
CVE-2021-33757 affects various versions of Windows 10, Windows 7, Windows 8.1, and multiple Windows Server editions.
Yes, CVE-2021-33757 can be exploited remotely, allowing attackers to bypass security features.
While you can continue using your system, it is recommended to apply the relevant updates to protect against potential exploitation of CVE-2021-33757.