Wednesday, April 23, 2025
Homecyber securityMicrosoft Released a Security Update With The Fixes For 6 New Windows...

Microsoft Released a Security Update With The Fixes For 6 New Windows 0-Day Bugs

Published on

SIEM as a Service

Follow Us on Google News

Recently, as a part of the June Patch, Microsoft has fixed 50 security flaws, among which 5 of them were rated critical, and the other 45 are classed as important in severity.

All the vulnerabilities have been patched by Microsoft that are present in the following products of Microsoft:-

  • Microsoft Office
  • .NET Core and Visual Studio
  • Edge browser
  • Windows Cryptographic Services
  • SharePoint
  • Outlook
  • Excel

Zero-day vulnerabilities

Apart from these things, Microsoft has also addressed 6 zero-day vulnerabilities, and among these 6 zero-day vulnerabilities, the security experts at Microsoft have detected that one of the flaws has been using a commercial exploit.

- Advertisement - Google News

Here the list of all 6 zero-day vulnerabilities:-

  • CVE-2021-33742 (CVSS score: 7.5): Windows MSHTML Platform Remote Code Execution Vulnerability.
  • CVE-2021-33739 (CVSS score: 8.4): Microsoft DWM Core Library Elevation of Privilege Vulnerability.
  • CVE-2021-31199 (CVSS score: 5.2): Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability.
  • CVE-2021-31201 (CVSS score: 5.2): Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability.
  • CVE-2021-31955 (CVSS score: 5.5): Windows Kernel Information Disclosure Vulnerability.
  • CVE-2021-31956 (CVSS score: 7.8): Windows NTFS Elevation of Privilege Vulnerability.

However, to give all its users and administrators more time to install the patches, Microsoft has not yet unveiled any details of the vulnerabilities.

Among the 6 zero-day vulnerabilities, 4 vulnerabilities are privilege escalation flaws which imply that hackers might have exploited these security flaws to gain elevated permissions on the affected systems as part of the infection chain.

Moreover, the security researchers at Microsoft have asserted that the CVE-2021-33742 is an RCE vulnerability in the MSHTML component, which is part of the Internet Explorer web browser.

While Shane Huntley, the Google analyst has claimed, that the CVE-2021-33742 is not only abused by independent threat actors but also used by government hackers to attack targets in Eastern Europe and the Middle East.

The patches for CVE-2021-31201 and CVE-2021-31199 are related to the RCE issue CVE-2021-28550, which was already fixed last month by the developers at Adobe.

So, to protect your Windows system and avoid such security risks, Microsoft has strongly recommended all its users to install all the security updates immediately.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the June 2021 Patch here.

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Cloud Composer Flaw Allows Attackers to Gain Elevated Privileges

Research disclosed a now-patched high-severity vulnerability in Google Cloud Platform’s (GCP) Cloud Composer service,...

Moodle Core vulnerabilities Allow Attackers to Evade Security Measures

A recent security audit has uncovered critical vulnerabilities within Moodle, the widely used open-source...

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...