{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Microsoft Visual Studio 2022 version 17.0","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"PowerShell 7.2","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft BizTalk ESB Toolkit 2.2","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2019 version 16.7 (includes 16.0 \u2013 16.6)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"HEVC Video Extensions","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Raw Image Extension","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Visual Studio Code WSL Extension","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"VP9 Video Extensions","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Visual Studio Code","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft 365 Apps pour Enterprise pour 64 bits Systems","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft BizTalk ESB Toolkit 2.4","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Defender pour IoT","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft 4K Wireless Display Adapter","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft BizTalk ESB Toolkit 2.3","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"App Installer","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2021-43908","url":"https://www.cve.org/CVERecord?id=CVE-2021-43908"},{"name":"CVE-2021-41360","url":"https://www.cve.org/CVERecord?id=CVE-2021-41360"},{"name":"CVE-2021-42295","url":"https://www.cve.org/CVERecord?id=CVE-2021-42295"},{"name":"CVE-2021-43889","url":"https://www.cve.org/CVERecord?id=CVE-2021-43889"},{"name":"CVE-2021-40452","url":"https://www.cve.org/CVERecord?id=CVE-2021-40452"},{"name":"CVE-2021-43890","url":"https://www.cve.org/CVERecord?id=CVE-2021-43890"},{"name":"CVE-2021-43892","url":"https://www.cve.org/CVERecord?id=CVE-2021-43892"},{"name":"CVE-2021-42313","url":"https://www.cve.org/CVERecord?id=CVE-2021-42313"},{"name":"CVE-2021-43255","url":"https://www.cve.org/CVERecord?id=CVE-2021-43255"},{"name":"CVE-2021-43896","url":"https://www.cve.org/CVERecord?id=CVE-2021-43896"},{"name":"CVE-2021-41365","url":"https://www.cve.org/CVERecord?id=CVE-2021-41365"},{"name":"CVE-2021-43256","url":"https://www.cve.org/CVERecord?id=CVE-2021-43256"},{"name":"CVE-2021-42310","url":"https://www.cve.org/CVERecord?id=CVE-2021-42310"},{"name":"CVE-2021-40453","url":"https://www.cve.org/CVERecord?id=CVE-2021-40453"},{"name":"CVE-2021-42315","url":"https://www.cve.org/CVERecord?id=CVE-2021-42315"},{"name":"CVE-2021-43875","url":"https://www.cve.org/CVERecord?id=CVE-2021-43875"},{"name":"CVE-2021-42314","url":"https://www.cve.org/CVERecord?id=CVE-2021-42314"},{"name":"CVE-2021-43907","url":"https://www.cve.org/CVERecord?id=CVE-2021-43907"},{"name":"CVE-2021-42293","url":"https://www.cve.org/CVERecord?id=CVE-2021-42293"},{"name":"CVE-2021-43877","url":"https://www.cve.org/CVERecord?id=CVE-2021-43877"},{"name":"CVE-2021-43888","url":"https://www.cve.org/CVERecord?id=CVE-2021-43888"},{"name":"CVE-2021-43214","url":"https://www.cve.org/CVERecord?id=CVE-2021-43214"},{"name":"CVE-2021-43891","url":"https://www.cve.org/CVERecord?id=CVE-2021-43891"},{"name":"CVE-2021-43882","url":"https://www.cve.org/CVERecord?id=CVE-2021-43882"},{"name":"CVE-2021-42311","url":"https://www.cve.org/CVERecord?id=CVE-2021-42311"},{"name":"CVE-2021-43243","url":"https://www.cve.org/CVERecord?id=CVE-2021-43243"},{"name":"CVE-2021-43899","url":"https://www.cve.org/CVERecord?id=CVE-2021-43899"},{"name":"CVE-2021-42312","url":"https://www.cve.org/CVERecord?id=CVE-2021-42312"}],"links":[],"reference":"CERTFR-2021-AVI-961","revisions":[{"description":"Version initiale","revision_date":"2021-12-15T00:00:00.000000"}],"risks":[{"description":"Usurpation d'identit\u00e9"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Microsoft</span>. Elles permettent \u00e0 un\nattaquant de provoquer une usurpation d'identit\u00e9, une \u00e9l\u00e9vation de\nprivil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\nex\u00e9cution de code \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft du 14 d\u00e9cembre 2021","url":"https://msrc.microsoft.com/update-guide/"}]}
