Upozorňujeme na kritické zranitelnosti komponent systému Windows, zejména na zranitelnosti s hodnocením CVSSv3 9.8, u kterých je v budoucnu velmi pravděpodobné zneužití. Jedná se o zranitelnosti komponent Windows DNS server (CVE-2021-24078), Windows Fax service (CVE-2021-24077) a Windows TCP/IP (CVE-2021-24074, CVE-2021-24094). Další zranitelnosti s nižšími hodnoceními naleznete v tabulce a odkazech níže.
U zranitelnosti komponenty Win32k.sys (CVE-2021-1732) doporučujeme prioritizaci opravy, jelikož byl již vytvořen funkční exploit, který funguje na nejnovějších systémech Windows 10 a Windows Server 2019 a již jej využívají útočníci.
Zranitelnost Windows DNS serveru (CVE-2021-24078) spočívá v dotazech na doménu, kterou server dříve nepřeložil. Zranitelnost tedy může být zneužita např. pomocí odkazu v phishingových e-mailech či stáhnutím externího obsahu zprávy.
Dále do většího povědomí uvádíme zranitelnost komponenty Windows Local Spooler (CVE-2021-24088). Jedná se o komponentu, u které byly zranitelnosti již dříve hojně využívány např.: CVE-2020-0986.
K vybraným zranitelnostem doporučujeme také článek Microsoft Security Response Center: https://msrc-blog.microsoft.com/2021/02/09/multiple-security-updates-affecting-tcp-ip/
Ke všem zranitelnostem je vydána oficiální oprava. Pokud je z procesních důvodů nemožné opravy aplikovat v dohledné době, důrazně doporučujeme aplikovat alespoň workaround, který je u většiny kritických zranitelností popsán.
CVE |
Komponenta |
Typ zranitelnosti |
CVSSv3 |
CVE-2021-24088 |
Windows Local Spooler |
Remote Code Execution |
8.8 |
CVE-2021-24106 |
Windows DirectX |
Information Disclosure |
5.5 |
CVE-2021-1732 |
Windows Win32k |
Elevation of Privilege |
7.8 |
CVE-2021-1698 |
Windows Win32k |
Elevation of Privilege |
7.8 |
CVE-2021-24096 |
Windows Kernel |
Elevation of Privilege |
7.8 |
CVE-2021-24083 |
Windows Address Book |
Remote Code Execution |
7.8 |
CVE-2021-1727 |
Windows Installer |
Elevation of Privilege |
7.8 |
CVE-2021-25195 |
Windows PKU2U |
Elevation of Privilege |
7.8 |
CVE-2021-24098 |
Windows Console Driver |
Denial of Service |
5.5 |
CVE-2021-24078 |
Windows DNS Server |
Remote Code Execution |
9.8 |
CVE-2021-1722 |
Windows Fax Service |
Remote Code Execution |
8.1 |
CVE-2021-24077 |
Windows Fax Service |
Remote Code Execution |
9.8 |
CVE-2021-24082 |
Microsoft.PowerShell.Utility Module WDAC |
Security Feature Bypass |
4.3 |
CVE-2021-24076 |
Microsoft Windows VMSwitch |
Information Disclosure |
5.5 |
CVE-2021-24075 |
Windows Network File System |
Denial of Service |
6.8 |
CVE-2021-24074 |
Windows TCP/IP |
Remote Code Execution |
9.8 |
CVE-2021-24086 |
Windows TCP/IP |
Denial of Service |
7.5 |
CVE-2021-24094 |
Windows TCP/IP |
Remote Code Execution |
9.8 |
CVE-2021-24079 |
Windows Backup Engine |
Information Disclosure |
5.5 |
CVE-2021-1734 |
Windows Remote Procedure Call |
Information Disclosure |
7.5 |
CVE-2021-1731 |
PFX Encryption |
Security Feature Bypass |
5.5 |
CVE-2021-24084 |
Windows Mobile Device Management |
Information Disclosure |
5.5 |
CVE-2021-24080 |
Windows Trust Verification API |
Denial of Service |
6.5 |
CVE-2021-24102 |
Windows Event Tracing |
Elevation of Privilege |
7.8 |
CVE-2021-24103 |
Windows Event Tracing |
Elevation of Privilege |
7.8 |
CVE-2021-24081 |
Microsoft Windows Codecs Library |
Remote Code Execution |
7.8 |
CVE-2021-24091 |
Windows Camera Codec Pack |
Remote Code Execution |
7.8 |
CVE-2021-24093 |
Windows Graphics Component |
Remote Code Execution |
8.8 |
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24088
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24106
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1732
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1698
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24096
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24083
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1727
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-25195
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24098
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24078
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1722
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24077
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24082
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24076
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24075
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24074
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24086
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24094
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24079
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1734
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1731
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24084
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24080
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24102
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24103
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24081
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24091
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24093