7.5
CVSSv2

CVE-2021-43217

Published: 15/12/2021 Updated: 12/07/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Windows Encrypting File System (EFS) Remote Code Execution Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008 r2

microsoft windows server 2012 r2

microsoft windows 10 1607

microsoft windows 8.1 -

microsoft windows server 2016 -

microsoft windows server 2008 -

microsoft windows 7 -

microsoft windows rt 8.1 -

microsoft windows server 2012 -

microsoft windows 10 -

microsoft windows 10 20h2

microsoft windows 10 21h1

microsoft windows 10 1809

microsoft windows 10 1909

microsoft windows 10 2004

microsoft windows 11 -

microsoft windows server 20h2

microsoft windows server 2016 2004

microsoft windows server 2022

microsoft windows server 2019 -

Github Repositories

🐞 Security tool to map CVE with KB & CVE with RHSA

ana --- ___ - --- / -, \ ( ) \ / -, \ (__) ; | | - (__) ; | '` | | | | | '` | / '| | | | | | / '| | | / | | | | | | | / | | ; | ; | | | | | ; | ; | ' `-' | | | | | ' `-' | `__'_ (___)(___) `__�

Local privilege escalation via PetitPotam (Abusing impersonate privileges).

PetitPotato Local privilege escalation via PetitPotam (Abusing impersonate privileges) Description PetitPotam uses MS-EFSR (Encrypting File System Remote), a protocol used to perform maintenance and management operations on encrypted data stored remotely and accessed over a network There are a series of APIs similar to EfsRpcOpenFileRaw in MS-EFSR The syntax of the EfsRpcOpe

Recent Articles

Microsoft closes installer hole abused by Emotet malware, Google splats Chrome bug exploited in the wild
The Register β€’ Chris Williams, Editor in Chief β€’ 15 Dec 2021

Get our weekly newsletter Round off the year with a large crop of fixes for programming blunders

Patch Tuesday It's not just Log4j you need to worry about this week. It's the final Patch Tuesday of the year. If you haven't already installed these fixes, or started testing them ahead of deployment, now would be a good time before exploits are developed and deployed over the Christmas break. At least two of them – one in Windows AppX Installer and one in Chrome – are being exploited in the wild right now. Let's start with Microsoft, which put out a summary of its security updates here. Al...