{"containers":{"cna":{"title":"Win32k Elevation of Privilege Vulnerability","datePublic":"2021-10-12T07:00:00.000Z","affected":[{"vendor":"Microsoft","product":"Windows 10 Version 1809","cpes":["cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x86:*","cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x64:*","cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:arm64:*"],"platforms":["32-bit Systems","x64-based Systems","ARM64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.17763.2237","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2019","cpes":["cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.17763.2237","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2019 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.17763.2237","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 10 Version 1909","cpes":["cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*","cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*","cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1854:*:*:*:*:*:x64:*"],"platforms":["32-bit Systems","x64-based Systems","ARM64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.18363.1854","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 10 Version 21H1","cpes":["cpe:2.3:o:microsoft:windows_10_21H1:10.0.19041.1288:*:*:*:*:*:x64:*","cpe:2.3:o:microsoft:windows_10_21H1:10.0.19041.1288:*:*:*:*:*:arm64:*","cpe:2.3:o:microsoft:windows_10_21H1:10.0.19041.1288:*:*:*:*:*:x86:*"],"platforms":["x64-based Systems","ARM64-based Systems","32-bit Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.19041.1288","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2022","cpes":["cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.20348.288","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 10 Version 2004","cpes":["cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:*"],"platforms":["32-bit Systems","ARM64-based Systems","x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.19041.1288","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server version 2004","cpes":["cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.19041.1288","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 10 Version 20H2","cpes":["cpe:2.3:o:microsoft:windows_10_20H2:10.0.19041.1288:*:*:*:*:*:x86:*","cpe:2.3:o:microsoft:windows_10_20H2:10.0.19041.1288:*:*:*:*:*:arm64:*"],"platforms":["32-bit Systems","ARM64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.19041.1288","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server version 20H2","cpes":["cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1288:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.19042.1288","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 11 version 21H2","cpes":["cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.258:*:*:*:*:*:x64:*","cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.258:*:*:*:*:*:arm64:*"],"platforms":["x64-based Systems","ARM64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.22000.258","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 10 Version 1507","cpes":["cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x86:*","cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x64:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.10240.19086","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 10 Version 1607","cpes":["cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x86:*","cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x64:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.14393.4704","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2016","cpes":["cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4704:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.14393.4704","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2016 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4704:*:*:*:*:*:*:*"],"platforms":["x64-based Systems"],"versions":[{"version":"10.0.0","lessThan":"10.0.14393.4704","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 7","cpes":["cpe:2.3:o:microsoft:windows_7:6.1.7601.25740:sp1:*:*:*:*:x86:*"],"platforms":["32-bit Systems"],"versions":[{"version":"6.1.0","lessThan":"6.1.7601.25740","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 7 Service Pack 1","cpes":["cpe:2.3:o:microsoft:windows_7:6.1.7601.25740:sp1:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.1.0","lessThan":"6.1.7601.25740","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows 8.1","cpes":["cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x86:*","cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x64:*","cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20144:*:*:*:*:*:*:*"],"platforms":["32-bit Systems","x64-based Systems","ARM64-based Systems"],"versions":[{"version":"6.3.0","lessThan":"6.3.9600.20144","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2008 Service Pack 2","cpes":["cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21251:*:*:*:*:*:x64:*"],"platforms":["32-bit Systems"],"versions":[{"version":"6.0.0","lessThan":"6.0.6003.21251","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2008 Service Pack 2 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21251:*:*:*:*:*:x64:*","cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21251:*:*:*:*:*:x86:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"6.0.0","lessThan":"6.0.6003.21251","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2008  Service Pack 2","cpes":["cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21251:*:*:*:*:*:x86:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.0.0","lessThan":"6.0.6003.21251","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2008 R2 Service Pack 1","cpes":["cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25740:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.1.0","lessThan":"6.1.7601.25740","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2008 R2 Service Pack 1 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25740:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.0.0","lessThan":"6.1.7601.25740","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2012","cpes":["cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23490:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.2.0","lessThan":"6.2.9200.23490","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2012 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23490:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.2.0","lessThan":"6.2.9200.23490","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2012 R2","cpes":["cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20144:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.3.0","lessThan":"6.3.9600.20144","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Windows Server 2012 R2 (Server Core installation)","cpes":["cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20144:*:*:*:*:*:x64:*"],"platforms":["x64-based Systems"],"versions":[{"version":"6.3.0","lessThan":"6.3.9600.20144","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"Win32k Elevation of Privilege Vulnerability","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"Elevation of Privilege","lang":"en-US","type":"Impact"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2024-05-29T14:52:10.960Z"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40449"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/164926/Win32k-NtGdiResetDC-Use-After-Free-Local-Privilege-Escalation.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseSeverity":"HIGH","baseScore":7.8,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T02:44:10.276Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40449"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/164926/Win32k-NtGdiResetDC-Use-After-Free-Local-Privilege-Escalation.html"}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2021-40449","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-07T14:36:14.212566Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2021-11-17","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40449"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40449","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-416","description":"CWE-416 Use After Free"}]}],"timeline":[{"time":"2021-11-17T00:00:00.000Z","lang":"en","value":"CVE-2021-40449 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:25:29.115Z"}}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2021-40449","datePublished":"2021-10-13T00:26:47.000Z","dateReserved":"2021-09-02T00:00:00.000Z","dateUpdated":"2025-10-21T23:25:29.115Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}