{"id":8498,"date":"2021-10-26T17:58:09","date_gmt":"2021-10-27T00:58:09","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=patch_watch&p=8498"},"modified":"2023-03-03T14:20:55","modified_gmt":"2023-03-03T21:20:55","slug":"october-microsoft-patches-74-security-vulnerabilities","status":"publish","type":"patch_watch","link":"https:\/\/webdev.securin.xyz\/patch_watch\/october-microsoft-patches-74-security-vulnerabilities\/","title":{"rendered":"October 2021: Microsoft Patches 74 Security Vulnerabilities"},"content":{"rendered":"
Microsoft<\/strong> patched 74 unique security vulnerabilities in October 2021, which includes four zero-day exploits. We analyzed these weaknesses and spotlighted the most important vulnerabilities that ought to be fixed on priority.<\/p>\n <\/p>\n \n This October, Microsoft patched 74 vulnerabilities discovered in 2021.<\/p>\n 20 CVEs are classified as Remote Code Execution bugs<\/p>\n<\/li>\n 21 CVEs with Privilege Escalation capabilities<\/p>\n<\/li>\n 13 CVEs are linked to Information Disclosure<\/p>\n<\/li>\n 5 CVEs have Denial of Service capabilities<\/p>\n<\/li>\n 9 CVEs has Spoofing possibilities<\/p>\n<\/li>\n 6 CVEs are Security Bypass bugs<\/p>\n<\/li>\n<\/ul>\n <\/p>\n Three of the CVEs CVE-2021-40469<\/a>, CVE-2021-41335<\/a>, and CVE-2021-41338<\/a> have been disclosed publicly, though haven\u2019t been observed in active exploitation.<\/p>\n \n \n Microsoft had released patches for four zero-day vulnerabilities this month:<\/p>\n CVE-2021-40449<\/a> – Win32K kernel driver<\/p>\n<\/li>\n CVE-2021-40469<\/a> – Windows DNS Server<\/p>\n<\/li>\n CVE-2021-41335<\/a> – Windows Kernel<\/p>\n<\/li>\n CVE-2021-41338<\/a> – Windows AppContainer Firewall Rules<\/p>\n<\/li>\n<\/ul>\n \n CVE-2021-40449<\/a> is an elevation of privilege vulnerability\u00a0 in the Win32k Kernel driver known to have been actively exploited in attacks. According to researchers, Chinese hacking groups are leveraging this vulnerability to launch espionage campaigns. As part of the intrusions, the threat actors deploy a remote access trojan (RAT) that is elevated with authorized rights to exploit this Windows vulnerability. This cluster of malicious activity is dubbed as MysterSnail by Kaspersky and is linked to the Chinese-speaking APT group, IronHusky.<\/p>\n <\/p>\n <\/p>\n Microsoft has patched a remote code execution (RCE) vulnerability in Exchange Server (CVE-2021-26427) that was disclosed by the National Security Agency<\/a> (NSA). An attacker would need direct network access to an Exchange Server to exploit this weakness, therefore it isn’t easily accessible via the Internet. However, because email servers are constantly attacked, it’s a good idea to fix your Exchange Servers as soon as possible. This CVE received a CVSS score of 9.0, the highest rated vulnerability of this month\u2019s patch release.<\/p>\n <\/p>\n <\/p>\nMicrosoft Patches: Overview<\/strong><\/h2>\n
\n
Zero-days<\/strong><\/h2>\n
\n
RCE\/PE<\/strong><\/h2>\n
Additional Fix for PrintNightmare<\/strong><\/h2>\n