{"id":8483,"date":"2021-11-17T17:31:33","date_gmt":"2021-11-18T00:31:33","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=patch_watch&p=8483"},"modified":"2023-03-03T14:19:58","modified_gmt":"2023-03-03T21:19:58","slug":"october-2021-patch-watch-digest","status":"publish","type":"patch_watch","link":"https:\/\/webdev.securin.xyz\/patch_watch\/october-2021-patch-watch-digest\/","title":{"rendered":"October 2021: Patch Watch Digest"},"content":{"rendered":"
18 vendors released security patches for 998 vulnerabilities, including 107 CVEs with known exploits.<\/a><\/p>\n<\/li>\n 20 vulnerabilities that were patched in October had been red-flagged by CISA.<\/a><\/p>\n<\/li>\n 231 old vulnerabilities have been patched.<\/a><\/p>\n<\/li>\n Microsoft plugged 74 bugs, including 4 zero days.<\/a><\/p>\n<\/li>\n<\/ul>\n We have 107 vulnerabilities that have known exploits. Here is our analysis \u2013<\/p>\n 5 CVEs are associated with ransomware strains that include Maze.<\/p>\n<\/li>\n 5 CVEs are linked to APT 1.<\/p>\n<\/li>\n 9 Malware groups (OceanSalt, Auriga, Bangat, BISCUIT, MAPIGET, TARSIP, SEASALT,\u00a0 KURTON, and HELAUTO) are correlated to 5 CVEs.<\/p>\n<\/li>\n 17 CVEs are classified as Remote Code Execution.<\/p>\n<\/li>\n 2 CVEs have local Privilege Escalation capabilities.<\/p>\n<\/li>\n 5 CVEs with Cross-Site Scripting (XSS) flaws.<\/p>\n<\/li>\n 28 CVEs are linked to Denial of Service (DoS).<\/p>\n<\/li>\n 56 CVEs fall into other categories.<\/p>\n<\/li>\n 20 CVEs are rated critical and 52 are of high severity.<\/p>\n<\/li>\n Of these 107 weaponized CVEs, 3 are alerted by CISA.<\/p>\n<\/li>\n<\/ul>\n Click here for our analysis and download patches.<\/a><\/p>\n <\/p>\n 231 old vulnerabilities have been fixed by vendors, ranging from the year 2015 to 2020.<\/p>\n 5 CVEs are associated with ransomware strains that include Maze and Cring.<\/p>\n<\/li>\n 5 CVEs are linked to APT 1.<\/p>\n<\/li>\n 9 Malware groups (OceanSalt, Auriga, Bangat, BISCUIT, MAPIGET, TARSIP, SEASALT,\u00a0 KURTON, and\u00a0 HELAUTO) are correlated to 3 CVEs.<\/p>\n<\/li>\n 14 CVEs are featured by CISA.<\/p>\n<\/li>\n Of these, 43 CVEs have known exploits.<\/p>\n<\/li>\n 1 CVE has Privilege Escalation capabilities.<\/p>\n<\/li>\n 3 CVEs are Remote Code Execution bugs.<\/p>\n<\/li>\n 29 CVEs are rated critical and 97 are of high severity.<\/p>\n<\/li>\n<\/ul>\n <\/p>\n Click here for our analysis and download patches.<\/a><\/p>\n Microsoft had released patches for four zero-day vulnerabilities (CVE-2021-40449<\/a>, CVE-2021-40469<\/a>, CVE-2021-41335<\/a>, and CVE-2021-41338<\/a>) this October. Three CVEs, CVE-2021-40469, CVE-2021-41335, and CVE-2021-41338, have been publicly disclosed, however no active exploitation has been discovered.<\/p>\n CVE-2021-40449 is a Win32k Kernel driver elevation of privilege vulnerability that has been actively exploited in attacks. To exploit this Windows vulnerability, the threat actors use a remote access trojan (RAT) that is elevated with legal permissions as part of the intrusions. Kaspersky has termed this cluster of malicious activity as MysterSnail and has linked it to the Chinese-speaking APT group IronHusky.<\/p>\n <\/p>\n Check out our Microsoft patch watch edition here.<\/a><\/p>\n CISA has issued alerts for 20 vulnerabilities, including 3 publicly-known exploits.<\/p>\n 1 CVE is associated with Maze and APT 1.<\/p>\n<\/li>\n 1 CVE is classified as a Local Privilege Escalation.<\/p>\n<\/li>\n 2 CVEs are rated critical and 8 are of high severity.<\/p>\n<\/li>\n<\/ul>\n Click here for our analysis and download patches.<\/a><\/p>\n <\/p>\n<\/a>Weaponized Vulnerabilities<\/h2>\n
\n
<\/a>Old Vulnerabilities<\/h2>\n
\n
<\/a>Microsoft October\u00a0Patches 2021<\/h2>\n
<\/a>CISA Alerts<\/h2>\n
\n