Sicherheitsanfälligkeit im Windows DCOM-Server durch Umgehung von Sicherheitsfunktionen
Veröffentlichung: 8. Juni 2021
Zuletzt aktualisiert: 25. Apr. 2023
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2021-26414
- Auswirkung
- Umgehung von Sicherheitsfunktionen
- Maximaler Schweregrad
- Wichtig
- CVSS Source
- Microsoft
- Vektorzeichenfolge
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
- Metrics
- CVSS:3.1 4.8 / 4.2Base-Score-Metriken: 4.8/Temporal-Score-Metriken: 4.2
Angriffsvektor
Netzwerk
Angriffskomplexität
Hoch
Berechtigungen erforderlich
Niedrig
Benutzerinteraktion
Anforderung
Umfang
Unverändert
Vertraulichkeit
Keine
Integrität
Hoch
Verfügbarkeit
Keine
Exploit Code Maturity
Nicht belegt
Behebungsgrad
Offizieller Fix
Berichtszuverlässigkeit
Bestätigt
Weitere Informationen zur Definition dieser Metriken finden Sie unter Common Vulnerability Scoring System.
Ausnutzbarkeit
Die folgende Tabelle enthält eine Bewertung der Ausnutzbarkeit dieser Sicherheitsanfälligkeit zum Zeitpunkt der ursprünglichen Veröffentlichung.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Ausnutzung weniger wahrscheinlich
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
This vulnerability requires that a user with an affected version of Windows access a malicious server. An attacker would have to host a specially crafted server share or website. An attacker would have no way to force users to visit this specially crafted server share or website, but would have to convince them to visit the server share or website, typically by way of an enticement in an email or chat message.
Do I need to take further steps to be protected from this vulnerability?
Yes. The security updates released on June 8, 2021 enable RPC_C_AUTHN_LEVEL_PKT_INTEGRITY on DCOM clients by default and provide full protection after manually setting RequireIntegrityActivationAuthenticationLevel = 1 on DCOM servers using the steps in Managing changes for Windows DCOM Server Security Feature Bypass (CVE-2021-26414). Note that a reboot is required after making any changes to the RequireIntegrityActivationAuthenticationLevel registry key. Microsoft recommends enabling full protection as soon as possible to identify any OS and application intermobility issues between Windows and non-Windows operating systems and applications.
With the June 14, 2022 security updates, RPC_C_AUTHN_LEVEL_PKT_INTEGRITY on DCOM servers is now enabled by default. Customer who need to do so can still disable it by using the RequireIntegrityActivationAuthenticationLevel registry key.
If I install the updates and take no further action, what will be the impact?
Installing the security updates released on June 8, 2021 enables client side protections in a pure Windows environment but does not provide any protection in environments with non-Windows DCOM client. Organizations will need to identify and mitigate any interop issues between Windows and non-Windows operating systems and applications before the third phase, when the hardening on DCOM servers is enabled by default and will no longer have the ability to be disabled.
Installing the security updates released on June 14, 2022 enables the registry key by default so that DCOM servers enforce an Authentication-Level of RPC_C_AUTHN_LEVEL_PKT_INTEGRITY or higher for activation.
How does Microsoft plan to address this vulnerability?
Microsoft is addressing this vulnerability in a phased rollout. The initial deployment phase starts with the Windows updates released on June 8, 2021. The updates will enable customers to verify that any client/server applications in their environment work as expected with the hardening changes enabled.
The second phase, planned for an June 14, 2022, programmatically enables the hardening on DCOM servers by default that can be disabled via the RequireIntegrityActivationAuthenticationLevel registry key if necessary.
The third phase, planned for March 14, 2023, enables the hardening on DCOM servers by default and will no longer have the ability to be disabled. By this point, you must resolve any compatibility issues with the hardening changes and applications in your environment.
Are there system events available that will help me identify the client devices that will be impacted by the change?
Yes. See the New DCOM error events section of Managing changes for Windows DCOM Server Security Feature Bypass (CVE-2021-26414). While the first security updates to address this vulnerability were released on June 2021, we recommend that you install the updates released on September 2021 to enable DCOM event logs that were added with those updates.
Danksagung
- Dlive (https://twitter.com/D1iv3) of Tencent Security Xuanwu Lab
Sicherheitsupdates
Besuchen Sie die Seite Microsoft Lebenszyklusinformationen, um den Supportlebenszyklus für Ihre Softwareversion oder zu ermitteln.
- 10.0.19044.2728
- 10.0.19044.2728
- 10.0.19044.2728
- 10.0.22000.1696
- 10.0.22000.1696
- 10.0.20348.1607
- 10.0.20348.1607
- 6.3.9600.20402
- 6.3.9600.20402
- 6.3.9600.20402
- 6.3.9600.20402
- 6.1.7601.25984
- 6.1.7601.25984
- 6.1.7601.25984
- 6.1.7601.25984
- 10.0.14393.5786
- 10.0.14393.5786
- 10.0.14393.5786
- 10.0.14393.5786
- 10.0.18363.2344
- 10.0.18363.2344
- 10.0.18363.2344
- 10.0.17763.4131
- 10.0.17763.4131
- 6.3.9600.20865
- 6.3.9600.20865
- 6.3.9600.20865
- 6.3.9600.20865
- 10.0.10240.19802
- 10.0.10240.19802
- 10.0.19042.2728
- 10.0.17763.4131
- 10.0.17763.4131
- 10.0.17763.4131
- 6.2.9200.24168
- 6.2.9200.24168
- 6.2.9200.24168
- 6.2.9200.24168
- 6.1.7601.26415
- 6.1.7601.26415
- 6.1.7601.26415
- 6.1.7601.26415
- 6.0.6003.21966
- 6.0.6003.21966
- 6.0.6003.21966
- 6.0.6003.21966
- 6.0.6003.21966
- 6.0.6003.21966
- 6.0.6003.21966
- 6.0.6003.21966
- 10.0.19042.2728
- 10.0.19043.1766
- 10.0.19043.1766
Haftungsausschluss
Revisionen
Updated links to security updates. This is an informational change only.
Microsoft is announcing the release of the March 14, 2023 Windows security updates for all supported editions. These updates address the third phase of hardening changes for this vulnerability. After these updates are installed, hardening is enabled by default and customers will no longer have the ability to disable it. Microsoft strongly recommends that customers install the March 14, 2023 updates, but before doing so customers should resolve any compatibility issues with the hardening changes and applications in your environment. For more information see Managing changes for Windows DCOM Server Security Feature Bypass (CVE-2021-26414).
Fixed a typographical error. This is an information change only.
In the Security Updates table, added all supported editions of Windows 10 version 21H2, Windows Windows 11, and Windows Server 2022 as they are affected by this vulnerability. Customers running any of these versions of Windows should install the June 14, 2022 security updates to be protected from this vulnerability. After these updates are installed, RPC_C_AUTHN_LEVEL_PKT_INTEGRITY on DCOM servers will be enabled by default. Customers who need to do so can still disable it by using the RequireIntegrityActivationAuthenticationLevel registry key. Microsoft strongly recommends that customers install the updates, complete testing in your environment, and enable these hardening changes as soon as possible.
Updated FAQ information. This is an informational change only.
Microsoft is announcing the release of the June 14, 2022 Windows security updates to address the second phase of hardening changes for this vulnerability. After these updates are installed, RPC_C_AUTHN_LEVEL_PKT_INTEGRITY on DCOM servers will be enabled by default. Customers who need to do so can still disable it by using the RequireIntegrityActivationAuthenticationLevel registry key. Microsoft strongly recommends that customers install the June 14, 2022 updates, complete testing in your environment, and enable these hardening changes as soon as possible.
Updated FAQs with revised planned dates for phases two and three. This is an informational change only.
Updated FAQs as follows: Revised planned dates for phases two and three; Added recommendation to install September 2021 security updates to enable DCOM event logs that were added with those updates. These are informational changes only.
Updated FAQ with revised planned dates for phases two and three; added FAQ to provide link to information about system events. These are informational changes only.
Information published.