Microsoft Monthly Security Update (December 2021)
[Updated on 2025-10-08]
Updated Description, Source and Related Links.
CVE-2021-43226 is being exploited in the wild. Microsoft Windows Common Log File System Driver contains a privilege escalation vulnerability that could allow a local, privileged attacker to bypass certain security mechanisms.
Microsoft has released monthly security update for their products:
Vulnerable Product | Risk Level | Impacts | Notes |
Extended Security Updates (ESU) | ![]() | Elevation of Privilege Remote Code Execution Information Disclosure | CVE-2021-43226 is being exploited in the wild. Microsoft Windows Common Log File System Driver contains a privilege escalation vulnerability that could allow a local, privileged attacker to bypass certain security mechanisms. |
Windows | ![]() | Elevation of Privilege Remote Code Execution Information Disclosure Denial of Service | CVE-2021-43226 is being exploited in the wild. Microsoft Windows Common Log File System Driver contains a privilege escalation vulnerability that could allow a local, privileged attacker to bypass certain security mechanisms. |
System Center | ![]() | Remote Code Execution Elevation of Privilege Information Disclosure | |
Developer Tools | ![]() | Remote Code Execution Elevation of Privilege Spoofing | |
Microsoft Office | ![]() | Spoofing Remote Code Execution Elevation of Privilege Information Disclosure | |
Device | ![]() | Remote Code Execution | |
Apps | ![]() | Spoofing Remote Code Execution |
|
Browser | ![]() | Remote Code Execution Security Restriction Bypass |
|
Number of ‘Extremely High Risk’ product(s): 1
Number of ‘High Risk’ product(s): 1
Number of ‘Medium Risk’ product(s): 6
Number of ‘Low Risk’ product(s): 0
Evaluation of overall ‘Risk Level’: Extremely High Risk
RISK: Extremely High Risk
TYPE: Operating Systems – Windows OS

Impact
- Denial of Service
- Elevation of Privilege
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
- Spoofing
System / Technologies affected
- Extended Security Updates (ESU)
- Windows
- System Center
- Developer Tools
- Microsoft Office
- Device
- Apps
- Browser
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor.
Vulnerability Identifier
Source
Related Link
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.