CVE-2021-2688911.03.2021, 16:15Windows Update Stack Elevation of Privilege VulnerabilityLink FollowingEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST7.8 HIGHLOCALLOWLOWCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HmicrosoftCNA7.8 HIGHCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:CCVEADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 70%VendorProductVersionmicrosoftwindows_server_2019-𝑥= Vulnerable software versionsCommon Weakness EnumerationCWE-59 - Improper Link Resolution Before File Access ('Link Following')The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Referenceshttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26889https://www.zerodayinitiative.com/advisories/ZDI-21-328/https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26889https://www.zerodayinitiative.com/advisories/ZDI-21-328/