TRY NOW
Patch Tuesday

Microsoft Patch Tuesday – December 2021

6 min. read
14/12/2021
By Esben Dochy
Microsoft Patch Tuesday December 2021

Patch Tuesday is once again upon us. The December 2021 edition of Patch Tuesday brings us 68 fixes, 7 of which are rated as critical. This month also includes a windows 10 version going end of life. We’ve listed the most important changes below.

⚡ TL;DR | Go Straight to the December 2021 Patch Tuesday Audit Report

Windows 10 Version 2004 End of Life

Windows 10 version 2004 will, unlike others, go end of life in one big sweep. No matter what edition of Windows 10 you have, version 2004 is end of life starting today! Luckily, we’re prepared and we already have a Windows 10 end-of-life report that provides an overview of all current Windows 10 versions in your environment along with how many days are left until it is no longer supported.

iSNS Server Memory Corruption Vulnerability

With a CVSS 3.1 base score of 9.8, CVE-2021-43215 is one of the most critical vulnerabilities in this month’s patch Tuesday.

iSNS, or the Internet Storage Name Service protocol is used for communication between iSNS servers and iSNS clients. As the name would suggest iSNS manages an Internet Storage Name Service server that provides registration functionality in a storage network so that registering and querying the iSNS database is possible. Luckily iSNS isn’t something that is installed by default, so there is less chance you’re affected.

To quickly find which if your servers have the iSNS feature installed, the report below will provide you a quick overview.

Windows Encrypting File System (EFS) RCE

Windows’ EFS also received a patch, even when EFS isn’t in use, attackers can still exploit this vulnerability by causing a buffer overflow. This allows attackers to perform unauthenticated non-sandboxed code execution.

What’s special about this vulnerability is that it is being fixed in two stages. Stage 1 starts with today’s patch and will enable packet-level privacy for EFS when the client initiates a connection, and the server will only allow connections with packet-level privacy. Stage 2 will happen in Q1 2022, support for the AllowAllCliAuth registry key will be removed and servers will require packet-level privacy regardless of the registry key setting.

Run the Patch Tuesday December 2021 Audit Report

To help manage your update progress, we’ve created the Patch Tuesday Audit Report that checks if the assets in your network are on the latest patch updates. The report has been color-coded to see at a glance which machines are up-to-date and which ones still need to be updated. As always, system administrators are urged to update their environment as soon as possible to ensure all endpoints are secured.

Patch Tuesday December 2021 CVE Codes & Titles

CVE NumberCVE Title
CVE-2021-43908Visual Studio Code Spoofing Vulnerability
CVE-2021-43907Visual Studio Code WSL Extension Remote Code Execution Vulnerability
CVE-2021-43905Microsoft Office app Remote Code Execution Vulnerability
CVE-2021-43899Microsoft 4K Wireless Display Adapter Remote Code Execution Vulnerability
CVE-2021-43896Microsoft PowerShell Spoofing Vulnerability
CVE-2021-43893Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
CVE-2021-43892Microsoft BizTalk ESB Toolkit Spoofing Vulnerability
CVE-2021-43891Visual Studio Code Remote Code Execution Vulnerability
CVE-2021-43890Windows AppX Installer Spoofing Vulnerability
CVE-2021-43889Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2021-43888Microsoft Defender for IoT Information Disclosure Vulnerability
CVE-2021-43883Windows Installer Elevation of Privilege Vulnerability
CVE-2021-43882Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2021-43880Windows Mobile Device Management Elevation of Privilege Vulnerability
CVE-2021-43877ASP.NET Core and Visual Studio Elevation of Privilege Vulnerability
CVE-2021-43875Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2021-43256Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-43255Microsoft Office Trust Center Spoofing Vulnerability
CVE-2021-43248Windows Digital Media Receiver Elevation of Privilege Vulnerability
CVE-2021-43247Windows TCP/IP Driver Elevation of Privilege Vulnerability
CVE-2021-43246Windows Hyper-V Denial of Service Vulnerability
CVE-2021-43245Windows Digital TV Tuner Elevation of Privilege Vulnerability
CVE-2021-43244Windows Kernel Information Disclosure Vulnerability
CVE-2021-43243VP9 Video Extensions Information Disclosure Vulnerability
CVE-2021-43242Microsoft SharePoint Server Spoofing Vulnerability
CVE-2021-43240NTFS Set Short Name Elevation of Privilege Vulnerability
CVE-2021-43239Windows Recovery Environment Agent Elevation of Privilege Vulnerability
CVE-2021-43238Windows Remote Access Elevation of Privilege Vulnerability
CVE-2021-43237Windows Setup Elevation of Privilege Vulnerability
CVE-2021-43236Microsoft Message Queuing Information Disclosure Vulnerability
CVE-2021-43235Storage Spaces Controller Information Disclosure Vulnerability
CVE-2021-43234Windows Fax Service Remote Code Execution Vulnerability
CVE-2021-43233Remote Desktop Client Remote Code Execution Vulnerability
CVE-2021-43232Windows Event Tracing Remote Code Execution Vulnerability
CVE-2021-43231Windows NTFS Elevation of Privilege Vulnerability
CVE-2021-43230Windows NTFS Elevation of Privilege Vulnerability
CVE-2021-43229Windows NTFS Elevation of Privilege Vulnerability
CVE-2021-43228SymCrypt Denial of Service Vulnerability
CVE-2021-43227Storage Spaces Controller Information Disclosure Vulnerability
CVE-2021-43226Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2021-43225Bot Framework SDK Remote Code Execution Vulnerability
CVE-2021-43224Windows Common Log File System Driver Information Disclosure Vulnerability
CVE-2021-43223Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2021-43222Microsoft Message Queuing Information Disclosure Vulnerability
CVE-2021-43219DirectX Graphics Kernel File Denial of Service Vulnerability
CVE-2021-43217Windows Encrypting File System (EFS) Remote Code Execution Vulnerability
CVE-2021-43216Microsoft Local Security Authority Server (lsasrv) Information Disclosure Vulnerability
CVE-2021-43215iSNS Server Memory Corruption Vulnerability Can Lead to Remote Code Execution
CVE-2021-43214Web Media Extensions Remote Code Execution Vulnerability
CVE-2021-43207Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2021-42320Microsoft SharePoint Server Spoofing Vulnerability
CVE-2021-42315Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2021-42314Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2021-42313Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2021-42312Microsoft Defender for IOT Elevation of Privilege Vulnerability
CVE-2021-42311Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2021-42310Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2021-42309Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2021-42295Visual Basic for Applications Information Disclosure Vulnerability
CVE-2021-42294Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2021-42293Microsoft Jet Red Database Engine and Access Connectivity Engine Elevation of Privilege Vulnerability
CVE-2021-41365Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2021-41360HEVC Video Extensions Remote Code Execution Vulnerability
CVE-2021-41333Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2021-40453HEVC Video Extensions Remote Code Execution Vulnerability
CVE-2021-40452HEVC Video Extensions Remote Code Execution Vulnerability
CVE-2021-40441Windows Media Center Elevation of Privilege Vulnerability

Receive the Latest Patch Tuesday Report for FREE Every Month

"*" indicates required fields

Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
Hidden
This field is for validation purposes and should be left unchanged.
NO CREDIT CARD REQUIRED

Ready to get started?
You’ll be up and running in no time.

Explore all our features, free for 14 days.