Thursday, March 28, 2024

Microsoft Released a Security Update With The Fixes For 6 New Windows 0-Day Bugs

Recently, as a part of the June Patch, Microsoft has fixed 50 security flaws, among which 5 of them were rated critical, and the other 45 are classed as important in severity.

All the vulnerabilities have been patched by Microsoft that are present in the following products of Microsoft:-

  • Microsoft Office
  • .NET Core and Visual Studio
  • Edge browser
  • Windows Cryptographic Services
  • SharePoint
  • Outlook
  • Excel

Zero-day vulnerabilities

Apart from these things, Microsoft has also addressed 6 zero-day vulnerabilities, and among these 6 zero-day vulnerabilities, the security experts at Microsoft have detected that one of the flaws has been using a commercial exploit.

Here the list of all 6 zero-day vulnerabilities:-

  • CVE-2021-33742 (CVSS score: 7.5): Windows MSHTML Platform Remote Code Execution Vulnerability.
  • CVE-2021-33739 (CVSS score: 8.4): Microsoft DWM Core Library Elevation of Privilege Vulnerability.
  • CVE-2021-31199 (CVSS score: 5.2): Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability.
  • CVE-2021-31201 (CVSS score: 5.2): Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability.
  • CVE-2021-31955 (CVSS score: 5.5): Windows Kernel Information Disclosure Vulnerability.
  • CVE-2021-31956 (CVSS score: 7.8): Windows NTFS Elevation of Privilege Vulnerability.

However, to give all its users and administrators more time to install the patches, Microsoft has not yet unveiled any details of the vulnerabilities.

Among the 6 zero-day vulnerabilities, 4 vulnerabilities are privilege escalation flaws which imply that hackers might have exploited these security flaws to gain elevated permissions on the affected systems as part of the infection chain.

Moreover, the security researchers at Microsoft have asserted that the CVE-2021-33742 is an RCE vulnerability in the MSHTML component, which is part of the Internet Explorer web browser.

While Shane Huntley, the Google analyst has claimed, that the CVE-2021-33742 is not only abused by independent threat actors but also used by government hackers to attack targets in Eastern Europe and the Middle East.

The patches for CVE-2021-31201 and CVE-2021-31199 are related to the RCE issue CVE-2021-28550, which was already fixed last month by the developers at Adobe.

So, to protect your Windows system and avoid such security risks, Microsoft has strongly recommended all its users to install all the security updates immediately.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the June 2021 Patch here.

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles