CVE-2021-1732

Vulnerability Profile Updated a month ago
Download STIX
Preview STIX
CVE-2021-1732 is a software vulnerability, specifically a flaw in the design or implementation of Microsoft's Windows 10 systems. This vulnerability exposes the system to an elevation of privilege threat, where an attacker could potentially gain higher-level permissions on the system and carry out malicious activities. The exploit targets specific build numbers of Windows 10 and checks for the presence of a particular patch. This vulnerability was reported to Microsoft in 2021, and it bears similarities to another previously identified vulnerability. Upon receiving the report, Microsoft promptly released a patch to rectify the issue, demonstrating their proactive approach towards maintaining system security. However, the systems that have not applied this patch remain vulnerable to the CVE-2021-1732 exploit. Protection against this threat is provided by Check Point Threat Emulation and Intrusion Prevention System (IPS). These security solutions offer safeguards against the Trojan.Wins.RaspberryRobin threat, as well as the Microsoft Win32k Elevation of Privilege vulnerabilities (CVE-2021-1732 and CVE-2020-1054). It is crucial for organizations and individuals to ensure they have the latest patches and security updates installed to mitigate these risks effectively.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Exploit
Windows
Malware
Vulnerability
Chromium
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
Raspberry RobinUnspecified
1
Raspberry Robin, a malicious software first disclosed by Red Canary in 2022, has been identified as a significant threat to computer systems. The malware is known for its ability to exploit and damage your computer or device, often infiltrating the system through suspicious downloads, emails, or web
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
CVE-2020-1054Unspecified
1
CVE-2020-1054 is a software vulnerability that lies in the design and implementation of Microsoft's Win32k component. It specifically exploits a flaw in the win32k window object, enabling it to write data beyond its intended boundaries. This vulnerability is significant because it allows malicious a
ProxyshellUnspecified
1
ProxyShell is a chain of three vulnerabilities (tracked as CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207) that affect Microsoft Exchange email servers. These vulnerabilities allow unauthenticated attackers to gain administrator access and execute remote code on unpatched servers. Discovered in
ProxynotshellUnspecified
1
ProxyNotShell is a software vulnerability, specifically a flaw in the design or implementation of Microsoft Exchange Server. It was first identified and exploited through CVE-2022-41082, as reported by Palo Alto Networks' Unit 42. The ProxyNotShell exploit method leveraged an AutoDiscover endpoint t
FollinaUnspecified
1
Follina, also known as CVE-2022-30190, is a notable software vulnerability that was discovered and exploited in the first half of 2022. This flaw, found in the Microsoft Windows Support Diagnostic Tool (MSDT), was weaponized by TA413, a cyber threat actor group with suspected ties to China. The grou
Source Document References
Information about the CVE-2021-1732 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
DARKReading
4 months ago
Raspberry Robin Jumps on 1-Day Bugs to Nest Deep in Windows Networks
Checkpoint
a year ago
Raspberry Robin: Anti-Evasion How-To & Exploit Analysis - Check Point Research
InfoSecurity-magazine
a year ago
Raspberry Robin Adopts Unique Evasion Techniques
Securityaffairs
10 months ago
In 2022, more than 40% of zero-day exploits used in the wild were variations of previous issues
Unit42
a year ago
Inside Win32k Exploitation: Analysis of CVE-2022-21882 and CVE-2021-1732
CERT-EU
a year ago
24th April – Threat Intelligence Report - Check Point Research
Checkpoint
4 months ago
Raspberry Robin Keeps Riding the Wave of Endless 1-Days - Check Point Research
Unit42
a year ago
Inside Win32k Exploitation: Background on Implementations of Win32k and Exploitation Methodologies