First published: Wed Sep 15 2021(Updated: )
Windows Key Storage Provider Security Feature Bypass Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
=20h2 | ||
=21h1 | ||
=1809 | ||
=1909 | ||
=2004 | ||
=20h2 | ||
=2004 | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-38624 has a severity rating that indicates a security feature bypass vulnerability affecting Windows Key Storage Provider.
To fix CVE-2021-38624, you should apply the relevant security updates provided by Microsoft for the affected Windows versions.
CVE-2021-38624 affects multiple Windows versions, including Windows 10 (20H2, 21H1, 1809, 1909, 2004) and Windows Server 2016, 2019, and 2022.
CVE-2021-38624 is classified as a security feature bypass vulnerability, which could lead to unauthorized access.
CVE-2021-38624 does not require authentication for exploitation, making it a potential risk for remote attackers.