{"@odata.context":"https://api.msrc.microsoft.com/sug/v2.0/en-US/$metadata#vulnerability/$entity","id":"00000000-0000-0000-0000-0000b73d87bf","releaseDate":"2021-07-13T07:00:00Z","cveNumber":"CVE-2021-33781","cveTitle":"Azure AD Security Feature Bypass Vulnerability","releaseNumber":"2021-Jul","vulnType":"Security Vulnerability","latestRevisionDate":"2021-10-12T07:00:00Z","cweList":[],"mitreText":"CVE-2021-33781","mitreUrl":"https://www.cve.org/CVERecord?id=CVE-2021-33781","publiclyDisclosed":"Yes","exploited":"No","latestSoftwareReleaseId":2,"latestSoftwareRelease":"Exploitation Less Likely","olderSoftwareReleaseId":2,"olderSoftwareRelease":"Exploitation Less Likely","denialOfService":"N/A","tag":"Windows Active Directory","issuingCna":"Microsoft","severityId":100000001,"severity":"Important","impactId":100000007,"impact":"Security Feature Bypass","langCode":"en-US","baseScore":"8.1","temporalScore":"7.1","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C","isMariner":false,"articles":[],"revisions":[{"cveNumber":"CVE-2021-33781","version":2.0,"revisionDate":"2021-10-12T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"
In the Security Updates table, added all supported versions of Windows 10 Version 1607, Windows Server 2016, and Windows 11 because these versions of Windows 10, Windows Server, and Windows 11 are also affected by this vulnerability. Microsoft strongly recommends that customers running any of these versions install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
\n","unformattedDescription":"In the Security Updates table, added all supported versions of Windows 10 Version 1607, Windows Server 2016, and Windows 11 because these versions of Windows 10, Windows Server, and Windows 11 are also affected by this vulnerability. Microsoft strongly recommends that customers running any of these versions install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.","notificationNeeded":false,"notificationSent":false,"sourceId":"c2816a0c-ff26-ec11-a84d-000d3a6d3364"},{"cveNumber":"CVE-2021-33781","version":1.0,"revisionDate":"2021-07-13T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"Information published.
\n","unformattedDescription":"Information published.","notificationNeeded":false,"notificationSent":false,"sourceId":"1bf7c031-70c9-eb11-a838-000d3a6d35d9"},{"cveNumber":"CVE-2021-33781","version":1.1,"revisionDate":"2021-07-14T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"Corrected CVE title. This is an informational change only.
\n","unformattedDescription":"Corrected CVE title. This is an informational change only.","notificationNeeded":false,"notificationSent":false,"sourceId":"d2347af7-eae4-eb11-a83a-000d3a6d35d9"}]}