Security Announcement -Statement on Microsoft Windows Defender remote code execution vulnerability (CVE-2021-1647)

25-02-2021
  • LinkedIn
  • facebook
  • Twitter

Overview

The Background of security vulnerabilities

Windows Defender, an anti-virus software officially released by Microsoft, can run on Windows XP and later Windows operating systems, and is currently built into Windows Vista and later versions of Windows.

On January 8, 2021, the Threat Early Warning Team of the New H3C Offensive and Defense Laboratory monitored that Microsoft officially issued a security bulletin, reporting that Windows Defender has a remote code execution vulnerability, the vulnerability number is CVE-2021-1647, the vulnerability levelis the high.

Vulnerability principle

There is a remote code execution vulnerability in Windows Defender. Attackers can induce victims to download malicious files constructed by the attackers by sending emails or malicious links to the target machine. When Windows Defender is automatically scanning, the malicious file will trigger the vulnerability and execute arbitrary code on the victim's machine. According to Microsoft's official description, the wild use of CVE-2021-1647 has been discovered, and users are requested to update the patch as soon as possible.

The reproduce of security vulnerability

Set up the Windows 10 version environment and enable the Windows Defender component. When Windows Defender scans the malicious file, a command line will pop up.

图片

The scope of influence

Affected version:

Windows 7 SP1

Windows 8.1

Windows RT 8.1

Windows 10

Windows 10 Version 1607, 1803, 1809, 1909, 2004, 20H2

Windows Server 2008 SP2

Windows Server 2008 R2 SP1

Windows Server 2012, 2012R2 ,2016, 2019

Windows Server Version 1909,2004, 20h2

Solution

The official patch

The latest version of the official release has fixed this vulnerability, affected users are requested to update the patch as soon as possible. Patch download address:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1667

H3C security emergency response external service

H3C advocates that every effort be made to safeguard the ultimate interests of product users, to abide by principles of responsible disclosure of security incidents, and to handle product security issues in accordance with security issues mechanisms. For information on H3C's security emergency response service and H3C product vulnerabilities, please visit https://www.h3c.com/en/Support/Online_Help/psirt/.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网