CVE-2021-40460

EUVD-2021-27637
Windows Remote Procedure Call Runtime Security Feature Bypass Vulnerability
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
microsoftCNA
6.5 MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 79%
Affected Products (NVD)
VendorProductVersion
microsoftwindows_10
-
microsoftwindows_10
-
microsoftwindows_11
-
microsoftwindows_11
-
microsoftwindows_7
-
microsoftwindows_7
-
microsoftwindows_8.1
-
microsoftwindows_8.1
-
microsoftwindows_rt_8.1
-
microsoftwindows_server_2012
-
microsoftwindows_server_2016
-
microsoftwindows_server_2019
-
microsoftwindows_server_2022
*
𝑥
= Vulnerable software versions
Windows Releases
Platform
Version
Windows 10
(x64, x86)
1607 (x64, x86)
1809 (arm64, x64, x86)
1909 (arm64, x64, x86)
2004 (arm64, x64, x86)
20H2 (arm64, x86)
21H1 (arm64, x64, x86)
Windows 11
21H2 (arm64, x64)
Windows 7
Service Pack 1 (x64, x86)
Windows 8.1
(x64, x86)
(x64, x86)
Windows RT 8.1
All
Windows Server
2004 Server Core
20H2 Server Core
Windows Server 2008 R2
Service Pack 1 (x64)
Service Pack 1 Server Core (x64)
Windows Server 2012
Server Core
Standard
Windows Server 2012 R2
Server Core
Server Core
Standard
Standard
Windows Server 2016
Server Core
Standard
Windows Server 2019
Server Core
Standard
Windows Server 2022
Server Core
Standard