
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-43572 is a remote code execution (RCE) vulnerability in Microsoft Management Console that was discovered and disclosed in November 2021. The vulnerability allows an attacker to execute code when a user downloads and opens a specially-crafted malicious Microsoft Saved Console (MSC) file. Microsoft has confirmed both public functional exploit code and in-the-wild exploitation of this vulnerability (Rapid7 Blog).
The vulnerability is classified as a low-complexity attack that requires no user interaction for exploitation. It has been mapped to CWE-70 by Microsoft, which represents a very broad category of weaknesses. The vulnerability has a CVSSv3 base score of 7.8, indicating a significant severity level. After patching, Windows prevents untrusted MSC files from being opened, though the specific trust verification mechanism is not detailed (Rapid7 Blog).
Successful exploitation of this vulnerability enables remote code execution on the target system when a user opens a maliciously crafted MSC file. The attack does not require network-based exploitation, but rather relies on the user accessing a malicious file (Rapid7 Blog).
Microsoft has released patches to address this vulnerability. The primary mitigation is to apply the latest security updates, which implement protection against untrusted MSC files. Organizations should prioritize applying these patches given the active exploitation status (Rapid7 Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."