Saturday, March 1, 2025
Homecyber securityMicrosoft Released a Security Update With The Fixes For 6 New Windows...

Microsoft Released a Security Update With The Fixes For 6 New Windows 0-Day Bugs

Published on

SIEM as a Service

Follow Us on Google News

Recently, as a part of the June Patch, Microsoft has fixed 50 security flaws, among which 5 of them were rated critical, and the other 45 are classed as important in severity.

All the vulnerabilities have been patched by Microsoft that are present in the following products of Microsoft:-

  • Microsoft Office
  • .NET Core and Visual Studio
  • Edge browser
  • Windows Cryptographic Services
  • SharePoint
  • Outlook
  • Excel

Zero-day vulnerabilities

Apart from these things, Microsoft has also addressed 6 zero-day vulnerabilities, and among these 6 zero-day vulnerabilities, the security experts at Microsoft have detected that one of the flaws has been using a commercial exploit.

Here the list of all 6 zero-day vulnerabilities:-

  • CVE-2021-33742 (CVSS score: 7.5): Windows MSHTML Platform Remote Code Execution Vulnerability.
  • CVE-2021-33739 (CVSS score: 8.4): Microsoft DWM Core Library Elevation of Privilege Vulnerability.
  • CVE-2021-31199 (CVSS score: 5.2): Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability.
  • CVE-2021-31201 (CVSS score: 5.2): Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability.
  • CVE-2021-31955 (CVSS score: 5.5): Windows Kernel Information Disclosure Vulnerability.
  • CVE-2021-31956 (CVSS score: 7.8): Windows NTFS Elevation of Privilege Vulnerability.

However, to give all its users and administrators more time to install the patches, Microsoft has not yet unveiled any details of the vulnerabilities.

Among the 6 zero-day vulnerabilities, 4 vulnerabilities are privilege escalation flaws which imply that hackers might have exploited these security flaws to gain elevated permissions on the affected systems as part of the infection chain.

Moreover, the security researchers at Microsoft have asserted that the CVE-2021-33742 is an RCE vulnerability in the MSHTML component, which is part of the Internet Explorer web browser.

While Shane Huntley, the Google analyst has claimed, that the CVE-2021-33742 is not only abused by independent threat actors but also used by government hackers to attack targets in Eastern Europe and the Middle East.

The patches for CVE-2021-31201 and CVE-2021-31199 are related to the RCE issue CVE-2021-28550, which was already fixed last month by the developers at Adobe.

So, to protect your Windows system and avoid such security risks, Microsoft has strongly recommended all its users to install all the security updates immediately.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the June 2021 Patch here.

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...