vulnerability
Microsoft Windows: CVE-2021-36972: Windows SMB Information Disclosure Vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | 2021-09-14 | 2021-09-14 | 2024-09-06 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
2021-09-14
Added
2021-09-14
Modified
2024-09-06
Description
Windows SMB Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-36960.
Solution(s)
microsoft-windows-windows_10-1507-kb5005569microsoft-windows-windows_10-1607-kb5005573microsoft-windows-windows_10-1809-kb5005568microsoft-windows-windows_10-1909-kb5005566microsoft-windows-windows_10-2004-kb5005565microsoft-windows-windows_10-20h2-kb5005565microsoft-windows-windows_10-21h1-kb5005565microsoft-windows-windows_server_2012-kb5005607microsoft-windows-windows_server_2012_r2-kb5005627microsoft-windows-windows_server_2016-1607-kb5005573microsoft-windows-windows_server_2019-1809-kb5005568microsoft-windows-windows_server_2022-21h2-kb5005575microsoft-windows-windows_server_2022-22h2-kb5005575msft-kb5005565-2ab61f5f-8761-4804-91cf-dbc91f70696bmsft-kb5005565-974eb306-66c8-438b-abf9-7c9c257b1440msft-kb5005607-556f4048-107a-4be1-8fe7-8d004a8b5c99msft-kb5005607-84b0cb6d-1a9f-4828-9e1d-ce11749b2fcfmsft-kb5005627-b87bbfe5-8077-405e-be9c-c468d388ca88msft-kb5005627-dd6e2af3-8f3f-43fd-aadf-36467be06042
References
- CVE-2021-36972
- https://attackerkb.com/topics/CVE-2021-36972
- URL-https://support.microsoft.com/help/5005565
- URL-https://support.microsoft.com/help/5005566
- URL-https://support.microsoft.com/help/5005568
- URL-https://support.microsoft.com/help/5005569
- URL-https://support.microsoft.com/help/5005573
- URL-https://support.microsoft.com/help/5005575
- URL-https://support.microsoft.com/help/5005607
- URL-https://support.microsoft.com/help/5005613
- URL-https://support.microsoft.com/help/5005627

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.