Show plain JSON{"id": "CVE-2021-26443", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.7, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 5.1, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "secure@microsoft.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 9.0, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 6.0, "exploitabilityScore": 2.3}, {"type": "Secondary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 9.0, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 6.0, "exploitabilityScore": 2.3}]}, "published": "2021-11-10T01:16:35.060", "references": [{"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26443", "tags": ["Patch", "Vendor Advisory"], "source": "secure@microsoft.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability"}, {"lang": "es", "value": "Una vulnerabilidad de Ejecuci\u00f3n de C\u00f3digo Remota en Microsoft Virtual Machine Bus (VMBus)"}], "lastModified": "2023-12-28T16:15:46.900", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "21074553-EDF2-468D-8E79-C39851B5BC79"}, {"criteria": "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "F8C238FA-B20F-40A5-B861-A8295858F4BE"}, {"criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "6CF580BA-6938-40F6-9D86-F43044A6BACA"}, {"criteria": "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "61F0792D-7587-4297-8EE7-D4DC3A30EE84"}, {"criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A190388-AA82-4504-9D5A-624F23268C9F"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B60D940-80C7-49F0-8F4E-3F99AC15FA82"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"}], "operator": "OR"}]}], "sourceIdentifier": "secure@microsoft.com"}