Reports indicated that an elevation of privilege vulnerability in Microsoft Windows 10 and some versions of Windows Server (CVE-2021-36948) is being actively exploited and multiple vulnerabilities in Microsoft Windows and Server (CVE-2021-36936, CVE-2021-36942 and CVE-2021-36947) are also at a high risk of exploitation. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Microsoft Windows 7, 8.1, RT 8.1, 10
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019
Microsoft Windows Server, version 2004, version 20H2
Microsoft Office 2019, 2019 for Mac
Microsoft 365 Apps for Enterprise
Microsoft SharePoint Enterprise Server 2013, 2016
Microsoft SharePoint Server 2019
Microsoft Visual Studio 2017, 2019, 2019 for Mac version 8.10
Microsoft Azure Active Directory Connect, Provisioning Agent
Microsoft Azure CycleCloud 7.9.10, 8.2.0
Microsoft Azure Sphere
Microsoft Dynamics 365 (on-premises) version 9.0, version 9.1
Microsoft Dynamics 365 Business Central 2019, 2020
Microsoft Dynamics NAV 2017, 2018
Microsoft Malware Protection Engine
.NET Core 2.1, 3.1
ASP.NET Core 2.1, 3.1, 5.0
Remote Desktop client for Windows Desktop
Windows Update Assistant
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, information disclosure, denial of service and spoofing.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.