CVE-2021-40449: Win32k Elevation of Privilege Vulnerability

Overview

Severity
High (CVSS 7.8)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Category
Elevation of Privilege
Exploit Status
Actively Exploited
Exploitation Likelihood
Detected
Patch Tuesday
2021-Oct
Released
2021-10-12
EPSS Score
91.73% (percentile: 99.7%)
CISA KEV
Listed — due 2021-12-01

Known Exploits (9)

  • Microsoft Windows Win32k Privilege Escalation Vulnerability — added 2023-07-17T04:07:44Z
  • Microsoft Windows Win32k Privilege Escalation Vulnerability — added 2022-03-04T17:55:52Z
  • Microsoft Windows Win32k Privilege Escalation Vulnerability — added 2022-02-20T16:23:26Z
  • Microsoft Windows Win32k Privilege Escalation Vulnerability — added 2021-12-11T00:59:18+08:00
  • Microsoft Windows Win32k Privilege Escalation Vulnerability — added 2021-11-07T16:15:19Z
  • Microsoft Windows Win32k Privilege Escalation Vulnerability — added 2021-10-25T04:58:49Z
  • Microsoft Windows Win32k Privilege Escalation Vulnerability — added 2021-10-20T09:24:36Z
  • Microsoft Windows Win32k Privilege Escalation Vulnerability — added 2021-10-16T16:17:44Z
  • Microsoft Windows Win32k Privilege Escalation Vulnerability — added 2020-08-09T05:48:10Z

Detection & Weaponization (2 sources)

Maturity: Exploit

  • Metasploit modules: Win32k NtGdiResetDC Use After Free Local Privilege Elevation
  • GitHub PoC: 6 repositories

Affected Products (43)

Windows

  • Windows 10 Version 1809 for 32-bit Systems
  • Windows 10 Version 1809 for x64-based Systems
  • Windows 10 Version 1809 for ARM64-based Systems
  • Windows Server 2019
  • Windows Server 2019 (Server Core installation)
  • Windows 10 Version 1909 for 32-bit Systems
  • Windows 10 Version 1909 for x64-based Systems
  • Windows 10 Version 1909 for ARM64-based Systems
  • Windows 10 Version 21H1 for x64-based Systems
  • Windows 10 Version 21H1 for ARM64-based Systems
  • Windows 10 Version 21H1 for 32-bit Systems
  • Windows Server 2022
  • Windows Server 2022 (Server Core installation)
  • Windows 10 Version 2004 for 32-bit Systems
  • Windows 10 Version 2004 for ARM64-based Systems
  • Windows 10 Version 2004 for x64-based Systems
  • Windows Server, version 2004 (Server Core installation)
  • Windows 10 Version 20H2 for 32-bit Systems
  • Windows 10 Version 20H2 for ARM64-based Systems
  • Windows Server, version 20H2 (Server Core Installation)
  • Windows 11 version 21H2 for x64-based Systems
  • Windows 11 version 21H2 for ARM64-based Systems
  • Windows 10 for 32-bit Systems
  • Windows 10 for x64-based Systems
  • Windows 10 Version 1607 for 32-bit Systems
  • Windows 10 Version 1607 for x64-based Systems
  • Windows Server 2016
  • Windows Server 2016 (Server Core installation)
  • Windows 8.1 for 32-bit systems
  • Windows 8.1 for x64-based systems
  • Windows RT 8.1

ESU

  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
  • Windows Server 2012
  • Windows Server 2012 (Server Core installation)
  • Windows Server 2012 R2
  • Windows Server 2012 R2 (Server Core installation)

Security Updates (15)

Acknowledgments

<a href="https://twitter.com/oct0xor">Boris Larin (oct0xor)</a> with <a href="https://www.kaspersky.com/">Kaspersky</a>

Revision History

  • 2021-10-12: Information published.