CVE-2021-3118711.05.2021, 19:15Windows WalletService Elevation of Privilege VulnerabilityLink FollowingEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTPrimary7.8 HIGHLOCALLOWLOWCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HBase ScoreCVSS 3.xEPSS ScorePercentile: UnknownAffected Products (NVD)VendorProductVersionmicrosoftwindows_10-𝑥= Vulnerable software versionsWindows ReleasesPlatformVersionWindows 10(x64, x86)KB50031721607 (x64, x86)KB50031971803 (arm64, x64, x86)KB50031741809 (arm64, x64, x86)KB50031711909 (arm64, x64, x86)KB50031692004 (arm64, x64, x86)KB500317320H2 (arm64, x86)KB5003173Common Weakness EnumerationCWE-59 - Improper Link Resolution Before File Access ('Link Following')The software attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Referenceshttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31187https://www.zerodayinitiative.com/advisories/ZDI-21-571/https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31187https://www.zerodayinitiative.com/advisories/ZDI-21-571/