CVE-2021-33739: Microsoft DWM Core Library Elevation of Privilege Vulnerability
Overview
- Severity
- High (CVSS 8.4)
- CVSS Vector
- CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
- Category
- Elevation of Privilege
- Exploit Status
- Actively Exploited
- Exploitation Likelihood
- Detected
- Publicly Disclosed
- Yes
- Patch Tuesday
- 2021-Jun
- Released
- 2021-06-08
- Last Updated
- 2021-06-14
- EPSS Score
- 18.99% (percentile: 95.3%)
- CISA KEV
- Listed — due 2021-11-17
FAQ
How could an attacker exploit this vulnerability?
This vulnerability is subject to a local escalation of privilege attack. The attacker would most likely arrange to run an executable or script on the local computer. An attacker could gain access to the computer through a variety of methods, such as via a phishing attack where a user clicks an executable file that is attached to an email.
Known Exploits (3)
- Microsoft Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability — added 2021-09-24T03:33:02Z
- Microsoft Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability — added 2021-06-09T11:40:56Z
- Microsoft Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability — added 2020-08-09T05:48:10Z
Detection & Weaponization (1 sources)
Maturity: Exploit
- GitHub PoC: 2 repositories
Affected Products (13)
Windows
- Windows 10 Version 1909 for 32-bit Systems
- Windows 10 Version 1909 for x64-based Systems
- Windows 10 Version 1909 for ARM64-based Systems
- Windows 10 Version 21H1 for x64-based Systems
- Windows 10 Version 21H1 for ARM64-based Systems
- Windows 10 Version 21H1 for 32-bit Systems
- Windows 10 Version 2004 for 32-bit Systems
- Windows 10 Version 2004 for ARM64-based Systems
- Windows 10 Version 2004 for x64-based Systems
- Windows Server, version 2004 (Server Core installation)
- Windows 10 Version 20H2 for 32-bit Systems
- Windows 10 Version 20H2 for ARM64-based Systems
- Windows Server, version 20H2 (Server Core Installation)
Security Updates (2)
Acknowledgments
Tu XiaoYi with <a href="https://ti.dbappsecurity.com.cn/">DBAPPSecurity Threat Intelligence Center</a>, Dong Wu with <a href="https://ti.dbappsecurity.com.cn/">DBAPPSecurity Threat Intelligence Center</a>, <a href="https://twitter.com/jq0904">Jinquan(@jq0904) </a> with <a href="https://ti.dbappsecurity.com.cn/">DBAPPSecurity Threat Intelligence Center</a>
Revision History
- 2021-06-08: Information published.
- 2021-06-14: Added acknowledgements. This is an informational change only.