Update Your Windows Computers to New Patch 6

Microsoft on Tuesday released another round of security updates for operating systems and other supported software, squashing 50 vulnerabilities, including 6 zero-days that are said to be under active attack.

The flaws were identified and resolved in Microsoft Windows, .NET Core and Visual Studio, Microsoft Office, Microsoft Edge (Chromium-based and EdgeHTML), SharePoint Server, Hyper-V, Visual Studio Code IndustryTools, Windows HTML Platform, and Windows Remote Desktop.

Of these 50 , five are rated Critical, and 45 are rated Important in severity, with three of the issues publicly known at the time of release. The vulnerabilities that being actively exploited are listed below –

  • CVE-2021-33742 (CVSS score: 7.5) IndustryVulnerability
  • CVE-2021-33739 (CVSS score: 8.4) IndustryVulnerability
  • CVE-2021-31199 (CVSS score: 5.2) IndustryVulnerability
  • CVE-2021-31201 (CVSS score: 5.2) IndustryVulnerability
  • CVE-2021-31955 (CVSS score: 5.5) IndustryVulnerability
  • CVE-2021-31956 (CVSS score: 7.8) IndustryVulnerability

Microsoft didn’t disclose the nature of the attacks, how widespread they are, or the identities of the threat actors exploiting them. But the fact that four of the six flaws are privilege escalation vulnerabilities suggests that attackers could be leveraging them as part of an infection chain to gain elevated permissions on the targeted systems to execute malicious code or leak sensitive information.

The Windows maker also noted that both CVE-2021-31201 and CVE-2021-31199 address flaws related to CVE-2021-28550, an arbitrary code execution vulnerability rectified by Adobe last month that it said was being “exploited in the wild in limited attacks targeting Adobe Reader users on Windows.”

Google’s Threat Analysis Group, which has been acknowledged as having reported CVE-2021-33742 to Microsoft, said “this seem[s] to be a commercial exploit company providing capability for limited nation state Eastern Europe / Middle East targeting.”

Russian cybersecurity firm Kaspersky, for its part, detailed that CVE-2021-31955 and CVE-2021-31956 were abused in a Chrome zero-day exploit chain (CVE-2021-21224) in a series of highly targeted attacks against multiple companies on April 14 and 15. The intrusions were attributed to a new threat actor dubbed “PuzzleMaker.”

“While we were not able to retrieve the exploit used for remote code execution (RCE) in the Chrome web browser, we were able to find and analyze an elevation of privilege (EoP) exploit that was used to escape the sandbox and obtain system privileges,” Kaspersky Lab researchers said.

Elsewhere, Microsoft fixed numerous remote code execution vulnerabilities spanning Paint 3D, Microsoft SharePoint Server, Microsoft Outlook, Microsoft Office Graphics, Microsoft Intune Management Extension, Microsoft Excel, and Microsoft Defender, as well as several privilege escalation flaws in Microsoft Edge, Windows Filter Manager, Windows Kernel, Windows Kernel-Mode Driver, Windows NTLM Elevation, and Windows Print Spooler.

To install the latest security updates, Windows users can head to Start > Settings > Update & Security > Windows Update or by selecting Check for Windows updates.

You might also like

Comments are closed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. AcceptRead More