There was a problem loading the comments.

About recommendation to update the patch for vulnerability CVE-2021-1675 on Windows

Support Portal  »  Announcements  »  Viewing Article

  Print
  • 28/06/2021 3:53 PM

Dear Valued Customers,

Thank for your trusting and using services at vHost during the time.

According to information vHost received from our partners, currently some versions of Microsoft Windows exists a vulnerability code CVE-2021-1675 (Windows Print Spooler Remote Code Execution Vulnerability).

This vulnerability has a high level of danger, and has been identified to affect most versions of Windows such as Windows 10, Windows 8.1, Windows 7; Windows Server 2019/2016/2012/2008. CVE-2021-1675 exists in Windows Print Spooler, if exploited, hackers not only have direct access to computers and servers that install Windows operating system versions, but also take advantage to conduct targeted cyber attacks from small scale to large scale.

For detailed information about the vulnerability, Customers can refer to the link announced by Microsoft below:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675

vHost would like to inform customers about Windows versions with vulnerabilities on:


• Windows Server 2012 R2 (Server Core installation)

• Windows Server 2012 R2

• Windows Server 2012 (Server Core installation)

• Windows Server 2012

• Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

• Windows Server 2008 R2 for x64-based Systems Service Pack 1

• Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

• Windows Server 2008 for x64-based Systems Service Pack 2

• Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)

• Windows Server 2008 for 32-bit Systems Service Pack 2

• Windows RT 8.1

• Windows 8.1 for x64-based systems

• Windows 8.1 for 32-bit systems

• Windows 7 for x64-based Systems Service Pack 1

• Windows 7 for 32-bit Systems Service Pack 1

• Windows Server 2016 (Server Core installation)

• Windows Server 2016

• Windows 10 Version 1607 for x64-based Systems

• Windows 10 Version 1607 for 32-bit Systems

• Windows 10 for x64-based Systems

• Windows 10 for 32-bit Systems

• Windows Server, version 20H2 (Server Core Installation)

• Windows 10 Version 20H2 for ARM64-based Systems

• Windows 10 Version 20H2 for 32-bit Systems

• Windows 10 Version 20H2 for x64-based Systems

• Windows Server, version 2004 (Server Core installation)

• Windows 10 Version 2004 for x64-based Systems

• Windows 10 Version 2004 for ARM64-based Systems

• Windows 10 Version 2004 for 32-bit Systems

• Windows 10 Version 21H1 for 32-bit Systems

• Windows 10 Version 21H1 for ARM64-based Systems

• Windows 10 Version 21H1 for x64-based Systems

• Windows 10 Version 1909 for ARM64-based Systems

• Windows 10 Version 1909 for x64-based Systems

• Windows 10 Version 1909 for 32-bit Systems

• Windows Server 2019 (Server Core installation)

• Windows Server 2019

• Windows 10 Version 1809 for ARM64-based Systems

• Windows 10 Version 1809 for x64-based Systems

Currently, Microsoft has also released a patch for the security vulnerability CVE-2021-1675. Therefore, vHost recommends that Customers who are using the above versions of Windows operating systems perform patch updates for their operating systems to avoid the risk of attacks and intrusions.

Customers download the patches corresponding to the Windows version at:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1675 (Security Update part)

In case you need more support, please contact vHost through the following channels:

Email:
support@vhost.vn
Ticket:
https://members.vhost.vn/submitticket.php
Call Center:
19006806 (press key 2)

Best Regards.

Share via
Did you find this article useful?  

Related Articles


Comments

Add Comment

Replying to  

CAPTCHA
© vHost.vn