Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2021-41379: Windows Installer Elevation of Privilege Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2021-41379: Windows Installer Elevation of Privilege Vulnerability

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
11/09/2021
Created
11/10/2021
Added
11/09/2021
Modified
07/22/2024

Description

Windows Installer Elevation of Privilege Vulnerability

Solution(s)

  • microsoft-windows-windows_10-1507-kb5007207
  • microsoft-windows-windows_10-1607-kb5007192
  • microsoft-windows-windows_10-1809-kb5007206
  • microsoft-windows-windows_10-1909-kb5007189
  • microsoft-windows-windows_10-2004-kb5007186
  • microsoft-windows-windows_10-20h2-kb5007186
  • microsoft-windows-windows_10-21h1-kb5007186
  • microsoft-windows-windows_11-21h2-kb5007215
  • microsoft-windows-windows_server_2022-21h2-kb5007205
  • microsoft-windows-windows_server_2022-22h2-kb5007205
  • msft-kb5007186-f18d4afc-f21b-41ac-bbaa-3ddbf2fc74a5
  • msft-kb5007186-fb6f0b5d-d6ef-41fa-80e7-d7fc8570a09e
  • msft-kb5007192-b4d62358-72b3-448f-a0c8-2dc6da3f116a
  • msft-kb5007206-27ab4bcc-6e83-4427-8daa-9c4233f59493
  • msft-kb5007233-1e63f91d-a537-4a19-9859-da7b767ab01f
  • msft-kb5007233-1eb340ab-1244-4ca5-86d0-51b9cfb50b38
  • msft-kb5007233-863157f1-c617-47b4-a915-b9a21f63f629
  • msft-kb5007233-a0e1164a-7271-4eec-a4dd-187d168e5369
  • msft-kb5007233-cdb22b80-d327-4039-a697-75b29fa14d75
  • msft-kb5007245-70e34787-b8fd-46c1-9872-c6e524c42865
  • msft-kb5007245-ae252ef9-46b6-4057-8058-44aa32fa3df4
  • msft-kb5007245-c2aa4af6-ed7e-40d3-966d-0fe055a94e3f
  • msft-kb5007246-a184215f-b49d-4700-959d-68eb04718063
  • msft-kb5007246-fc167773-2136-451e-8a51-1acad1bec69a
  • msft-kb5007255-55dee14b-2401-4ba7-b116-2b918f41bd26
  • msft-kb5007255-e1b353cd-2d41-4869-a168-173e15f47421
  • msft-kb5007255-e97d06b7-7075-4d3b-bb75-6d86a6d1eb07

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;