CVE-2021-33739: Microsoft DWM Core Library Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 8.4)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Actively Exploited
Exploitation Likelihood
Detected
Publicly Disclosed
Yes
Patch Tuesday
2021-Jun
Released
2021-06-08
Last Updated
2021-06-14
EPSS Score
18.99% (percentile: 95.3%)
CISA KEV
Listed — due 2021-11-17

FAQ

How could an attacker exploit this vulnerability? This vulnerability is subject to a local escalation of privilege attack. The attacker would most likely arrange to run an executable or script on the local computer. An attacker could gain access to the computer through a variety of methods, such as via a phishing attack where a user clicks an executable file that is attached to an email.

Known Exploits (3)

  • Microsoft Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability — added 2021-09-24T03:33:02Z
  • Microsoft Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability — added 2021-06-09T11:40:56Z
  • Microsoft Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability — added 2020-08-09T05:48:10Z

Detection & Weaponization (1 sources)

Maturity: Exploit

  • GitHub PoC: 2 repositories

Affected Products (13)

Windows

  • Windows 10 Version 1909 for 32-bit Systems
  • Windows 10 Version 1909 for x64-based Systems
  • Windows 10 Version 1909 for ARM64-based Systems
  • Windows 10 Version 21H1 for x64-based Systems
  • Windows 10 Version 21H1 for ARM64-based Systems
  • Windows 10 Version 21H1 for 32-bit Systems
  • Windows 10 Version 2004 for 32-bit Systems
  • Windows 10 Version 2004 for ARM64-based Systems
  • Windows 10 Version 2004 for x64-based Systems
  • Windows Server, version 2004 (Server Core installation)
  • Windows 10 Version 20H2 for 32-bit Systems
  • Windows 10 Version 20H2 for ARM64-based Systems
  • Windows Server, version 20H2 (Server Core Installation)

Security Updates (2)

Acknowledgments

Tu XiaoYi with <a href="https://ti.dbappsecurity.com.cn/">DBAPPSecurity Threat Intelligence Center</a>, Dong Wu with <a href="https://ti.dbappsecurity.com.cn/">DBAPPSecurity Threat Intelligence Center</a>, <a href="https://twitter.com/jq0904">Jinquan(@jq0904) </a> with <a href="https://ti.dbappsecurity.com.cn/">DBAPPSecurity Threat Intelligence Center</a>

Revision History

  • 2021-06-08: Information published.
  • 2021-06-14: Added acknowledgements. This is an informational change only.