{"id":8446,"date":"2021-06-17T13:24:10","date_gmt":"2021-06-17T20:24:10","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=patch_watch&p=8446"},"modified":"2023-03-03T14:34:40","modified_gmt":"2023-03-03T21:34:40","slug":"june-microsoft-patches-49-security-vulnerabilities","status":"publish","type":"patch_watch","link":"https:\/\/webdev.securin.xyz\/patch_watch\/june-microsoft-patches-49-security-vulnerabilities\/","title":{"rendered":"June: Microsoft Patches 49 Security Vulnerabilities"},"content":{"rendered":"
Microsoft patched 49 unique security vulnerabilities this June. We analyzed all 49\u00a0 weaknesses and spotlighted the most important vulnerabilities that ought to be patched on priority.<\/p>\n
This June, Microsoft patched 49 vulnerabilities discovered earlier in 2021, including six publicly disclosed bugs.<\/p>\n
Of these 49, Microsoft has fixed key vulnerabilities, including the following:<\/p>\n
16 CVEs classified as RCE bugs<\/p>\n<\/li>\n
13 CVEs with privilege escalation capabilities<\/p>\n<\/li>\n
\u00a05 CVEs linked to denial of service (DoS)<\/p>\n<\/li>\n
\u00a07 CVEs with information disclosure issues<\/p>\n<\/li>\n
\u00a04 CVEs associated with a security feature bypass<\/p>\n<\/li>\n
\u00a03 CVEs with spoofing flaws<\/p>\n<\/li>\n<\/ul>\n
Microsoft had released patches for seven zero-day vulnerabilities (CVE-2021-31955<\/a>, CVE-2021-31956<\/a>, CVE-2021-33739<\/a>, CVE-2021-33742<\/a>, CVE-2021-31199<\/a>, CVE-2021-31201<\/a>, and CVE-2021-31968<\/a>). Currently, six of these CVEs have publicly known exploits under active attack and must be prioritized for patching.<\/p>\n Additionally, a new threat group called PuzzleMaker leveraged two zero-day exploits (CVE-2021-31955<\/a> and CVE-2021-31956<\/a>) with a remote code execution weakness to target high-profile systems. The threat group utilized these two CVEs to execute malware modules with system privileges on compromised Windows 10 systems. To put a stop to this, Microsoft released patches for these two exploits.<\/p>\n However, organizations need to be wary of these two CVEs and ensure that they are patched immediately. Both vulnerabilities are of a high severity with a CWE of 200 (Exposure of Sensitive Information to an Unauthorized Actor) and 269 (Improper Privilege Management) classified under the Top 25 Most Dangerous Software Weaknesses.<\/a><\/p>\n In this Patch Watch, we focus on patches that were issued for 11 products. The Windows server accounted for 26 vulnerabilities, of which 12 have been categorized with privilege escalation capabilities, and two have been marked for remote code execution.<\/p>\n Notably, five of these 26 vulnerabilities have been marked critical and under remote code execution flaws.<\/p>\n <\/p>\nProduct Analysis<\/strong><\/h2>\n
<\/h2>\n
Severity<\/strong><\/h2>\n