First published: Wed Nov 10 2021(Updated: )
Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
=20h2 | ||
=20h2 | ||
=20h2 | ||
=21h1 | ||
=21h1 | ||
=21h1 | ||
=2004 | ||
=2004 | ||
=2004 | ||
=20h2 | ||
=2004 | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows Server | =20h2 | |
Microsoft Windows Server 2016 | =2004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42286 is a vulnerability in the Windows Core Shell SI Host Extension Framework that allows for the elevation of privilege.
Microsoft Windows 10 versions 20H2, 21H1, and 2004, as well as Windows Server versions 20H2 and 2016, are affected by CVE-2021-42286.
CVE-2021-42286 has a severity rating of 7.8, which is considered high.
To fix CVE-2021-42286, users should apply the latest security updates from Microsoft.
More information about CVE-2021-42286 can be found on the Microsoft Security Guidance Advisory page at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42286.