Saturday, March 15, 2025
HomeSecurity NewsMicrosoft Released New Security Patch Updates for More than 30 Critical Security...

Microsoft Released New Security Patch Updates for More than 30 Critical Security Issues

Published on

SIEM as a Service

Follow Us on Google News

Microsoft released security updates for December to patch 34 security issues in different software category and some of the patch released under very critical list.

This Released fix categorized to different Microsoft products and most of the fixed bugs are belongs to servers and Windows 8 and 10 system based vulnerabilites.

Many of office vulnerabilities are catogoried as a defense-in-depth measure and the update disables the Dynamic Update Exchange protocol (DDE) in all supported editions of Microsoft Word.

Microsoft Edge and Internet Explorer 11 having many bug fixes along with this security updates.

Also Read: New BlackArch Penetration Testing Linux ISOs Released with More Hacking Tools

All the windows 10 bugs are fixed by security realsed and In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.

Microsoft released security updates for following catogories
– Internet Explorer
– Microsoft Edge
– Microsoft Windows
– Microsoft Office and Microsoft Office Services and Web Apps
– Microsoft Exchange Server
– ChakraCore
– Microsoft Malware Protection Engine

Higly critical information disclouser vulneabities are exists when the Windows its:// protocol handler unnecessarily sends traffic to a remote site in order to determine the zone of a provided URL.

According to Microsoft,This could potentially result in the disclosure of sensitive information to a malicious site.
To exploit the vulnerability an attacker would have to trick a user into browsing to a malicious website or to an SMB or UNC path destination. An attacker who successfully tricked a user into disclosing the user’s NTLM hash could attempt a brute-force attack to disclose the corresponding hash password.
Windows 10 for 32-bit Systems 4053581Security UpdateInformation DisclosureImportant4048956
Windows 10 for x64-based Systems 4053581Security UpdateInformation DisclosureImportant4048956
Windows 10 Version 1511 for 32-bit Systems 4053578Security UpdateInformation DisclosureImportant4048952
Windows 10 Version 1511 for x64-based Systems 4053578Security UpdateInformation DisclosureImportant4048952
Windows 10 Version 1607 for 32-bit Systems 4054517Security UpdateInformation DisclosureImportant4048955
Windows 10 Version 1607 for x64-based Systems 4053579Security UpdateInformation DisclosureImportant4048953
Windows 10 Version 1703 for 32-bit Systems 4053580Security UpdateInformation DisclosureImportant4048954
Windows 10 Version 1703 for x64-based Systems 4053580Security UpdateInformation DisclosureImportant4048954
Windows 10 Version 1709 for 32-bit Systems 4054517Security UpdateInformation DisclosureImportant4048955
Windows 10 Version 1709 for x64-based Systems 4054517Security UpdateInformation DisclosureImportant4048955
Windows 7 for 32-bit Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows 7 for x64-based Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows 8.1 for 32-bit systems 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows 8.1 for x64-based systems 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows RT 8.1 4054519Monthly Rollup Information DisclosureImportant4048958
Windows Server 2008 for 32-bit Systems Service Pack 2 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for Itanium-Based Systems Service Pack 2 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for x64-based Systems Service Pack 2 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 4053473Security UpdateInformation DisclosureImportant 
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows Server 2008 R2 for x64-based Systems Service Pack 1 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 4054518Monthly RollupInformation DisclosureImportant4048957
4054521Security Only
Windows Server 2012 4054520Monthly RollupInformation DisclosureImportant4048959
4054523Security Only
Windows Server 2012 (Server Core installation) 4054520Monthly RollupInformation DisclosureImportant4048959
4054523Security Only
Windows Server 2012 R2 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows Server 2012 R2 (Server Core installation) 4054519Monthly RollupInformation DisclosureImportant4048958
4054522Security Only
Windows Server 2016 4053579Security UpdateInformation DisclosureImportant4048953
Windows Server 2016 (Server Core installation) 4053579Security UpdateInformation DisclosureImportant4048953
Windows Server, version 1709 (Server Core Installation) 4054517Security UpdateInformation DisclosureImportant4048955
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

49,000+ Access Management Systems Worldwide Exposed to Major Security Gaps

A recent study conducted by Dutch IT security consultancy Modat has revealed alarming vulnerabilities...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...