Microsoft Windows Network File System Remote Code Execution Vulnerability

Microsoft Windows Network File System Remote Code Execution Vulnerability

A Windows Services for Network File System (NFS) ONCRPC XDR Driver Remote Code Execution with a CVSS 3.1 score of 9.8 was released by Microsoft.

Microsoft Windows Network File System Remote Code Execution Vulnerability

Servers that have installed the NFS are exposed to this vulnerability in rpcxdr.sys. An attacker would require read or write permission to any file on an NFS share on the victim system. If NFS is configured to allow anonymous access, then the victim system would be vulnerable to unauthenticated attackers. Even though no exploits regarding this vulnerability has been discovered yet, due to its severity/criticality, it is highly recommended that the following patches are downloaded to ensure the safety of systems/assets.

Affected Systems

The servers/systems specified in the recommended solutions section are affected by this vulnerability.

IoC’s

-

Recommended Solution(s)

Organizations using the following products are recommended to download the patches in the table below.

Product Article Download
Windows Server 2012 R2 (Server Core installation) 5005076 Monthly Rollup
Windows Server 2012 R2 (Server Core installation) 5005106 Security Only
Windows Server 2012 R2 5005076 Monthly Rollup
Windows Server 2012 R2 5005106 Security Only
Windows Server 2012 (Server Core installation) 5005099 Monthly Rollup
Windows Server 2012 (Server Core installation) 5005094 Security Only
Windows Server 2012 5005099 Monthly Rollup
Windows Server 2012 5005094 Security Only
Windows RT 8.1 5005076

Monthly Rollup

Windows 8.1 for x64-based systems 5005076 Monthly Rollup
Windows 8.1 for x64-based systems 5005106 Security Only
Windows 8.1 for 32-bit systems 5005076 Monthly Rollup
Windows 8.1 for 32-bit systems 5005106 Security Only
Windows Server 2016 (Server Core installation) 5005043 Security Update
Windows Server 2016 5005043 Security Update
Windows 10 Version 1607 for x64-based Systems 5005043 Security Update
Windows 10 Version 1607 for 32-bit Systems 5005043 Security Update
Windows 10 for x64-based Systems 5005040 Security Update
Windows 10 for 32-bit Systems 5005040 Security Update
Windows Server, version 20H2 (Server Core Installation) 5005033 Security Update
Windows 10 Version 20H2 for ARM64-based Systems 5005033 Security Update
Windows 10 Version 20H2 for 32-bit Systems 5005033 Security Update
Windows 10 Version 20H2 for x64-based Systems 5005033 Security Update
Windows Server, version 2004 (Server Core installation) 5005033 Security Update
Windows 10 Version 2004 for x64-based Systems 5005033 Security Update
Windows 10 Version 2004 for ARM64-based Systems 5005033 Security Update
Windows 10 Version 2004 for 32-bit Systems 5005033 Security Update
Windows 10 Version 21H1 for 32-bit Systems 5005033 Security Update
Windows 10 Version 21H1 for ARM64-based Systems 5005033 Security Update
Windows 10 Version 21H1 for x64-based Systems 5005033 Security Update
Windows 10 Version 1909 for ARM64-based Systems 5005031 Security Update
Windows 10 Version 1909 for x64-based Systems 5005031 Security Update
Windows 10 Version 1909 for 32-bit Systems 5005031 Security Update
Windows Server 2019 (Server Core installation) 5005030 Security Update
Windows Server 2019 5005030 Security Update
Windows 10 Version 1809 for ARM64-based Systems 5005030 Security Update
Windows 10 Version 1809 for x64-based Systems 5005030 Security Update
Windows 10 Version 1809 for 32-bit Systems 5005030 Security Update

CVE / CWE

CVE-2021-26432

Related Website(s)

* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.