CVE-2021-2686311.03.2021, 16:15Windows Win32k Elevation of Privilege VulnerabilityEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST7 HIGHLOCALHIGHLOWCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HmicrosoftCNA7 HIGHCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CCVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 46%VendorProductVersionmicrosoftwindows_server_2019-𝑥= Vulnerable software versionsKnown Exploits!http://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.htmlhttp://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.htmlCommon Weakness EnumerationCWE-269 - Improper Privilege ManagementThe software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Referenceshttp://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.htmlhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26863http://packetstormsecurity.com/files/161768/Microsoft-Windows-Kernel-NtGdiGetDeviceCapsAll-Race-Condition-Use-After-Free.htmlhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26863