ID CVE-2021-36942
Summary Windows LSA Spoofing Vulnerability
References
Vulnerable Configurations
  • cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:x64:*
    cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:datacenter:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:datacenter:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:datacenter:*:x86:*
    cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:datacenter:*:x86:*
  • cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:essentials:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:essentials:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:essentials:*:x86:*
    cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:essentials:*:x86:*
  • cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:multipoint_premium_server:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:multipoint_premium_server:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:multipoint_premium_server:*:x86:*
    cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:multipoint_premium_server:*:x86:*
  • cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:standard:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:standard:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:standard:*:x86:*
    cpe:2.3:o:microsoft:windows_server_2016:-:-:*:*:standard:*:x86:*
  • cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:datacenter:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:datacenter:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:datacenter:*:x86:*
    cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:datacenter:*:x86:*
  • cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:standard:*:x64:*
    cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:standard:*:x64:*
  • cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:standard:*:x86:*
    cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:standard:*:x86:*
CVSS
Base: 5.0 (as of 26-07-2024 - 19:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
Last major update 26-07-2024 - 19:29
Published 12-08-2021 - 18:15
Last modified 26-07-2024 - 19:29
Back to Top