Description
Windows TCP/IP Driver Security Feature Bypass Vulnerability
References (2)
Core 2
Core References
Patch, Vendor Advisory x_refsource_misc
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31970
Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/163256/Microsoft-Windows-Filtering-Platform-Token-Access-Check-Privilege-Escalation.html
Scores
CVSS v3
5.5
EPSS
0.0080
EPSS Percentile
74.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-639
Status
published
Products (15)
microsoft/windows_10
microsoft/windows_10
20h2
microsoft/windows_10
21h1
microsoft/windows_10
1607
microsoft/windows_10
1809
microsoft/windows_10
1909
microsoft/windows_10
2004
microsoft/windows_8.1
microsoft/windows_rt_8.1
microsoft/windows_server_2012
... and 5 more
Published
Jun 08, 2021
Tracked Since
Feb 18, 2026