Microsoft Issues Patches for Actively Exploited Excel, Exchange Server 0-Day Bugs

Cyber Security

Products You May Like

Microsoft has released security updates as part of its monthly Patch Tuesday release cycle to address 55 vulnerabilities across Windows, Azure, Visual Studio, Windows Hyper-V, and Office, including fixes for two actively exploited zero-day flaws in Excel and Exchange Server that could be abused to take control of an affected system.

Of the 55 glitches, six are rated Critical and 49 are rated as Important in severity, with four others listed as publicly known at the time of release.

The most critical of the flaws are CVE-2021-42321 (CVSS score: 8.8) and CVE-2021-42292 (CVSS score: 7.8), each concerning a post-authentication remote code execution flaw in Microsoft Exchange Server and a security bypass vulnerability impacting Microsoft Excel versions 2013-2021 respectively.

The Exchange Server issue is also one of the bugs that was demonstrated at the Tianfu Cup held in China last month. However, the Redmond-based tech giant did not provide any details on how the two aforementioned vulnerabilities were used in real-world attacks.

Automatic GitHub Backups

“Earlier this year, Microsoft alerted that APT Group HAFNIUM was exploiting four zero-day vulnerabilities in the Microsoft Exchange server,” said Bharat Jogi, director of vulnerability and threat research at Qualys.

“This evolved into exploits of Exchange server vulnerabilities by DearCry Ransomware — including attacks on infectious disease researchers, law firms, universities, defense contractors, policy think tanks and NGOs. Instances such as these further underscore that Microsoft Exchange servers are high-value targets for hackers looking to penetrate critical networks,” Jogi added.

Also addressed are four publicly disclosed, but not exploited, vulnerabilities —

  • CVE-2021-43208 (CVSS score: 7.8) – 3D Viewer Remote Code Execution Vulnerability
  • CVE-2021-43209 (CVSS score: 7.8) – 3D Viewer Remote Code Execution Vulnerability
  • CVE-2021-38631 (CVSS score: 4.4) – Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
  • CVE-2021-41371 (CVSS score: 4.4) – Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability

Microsoft’s November patch also comes with a resolution for CVE-2021-3711, a critical buffer overflow flaw in OpenSSL’s SM2 decryption function that came to light in late August 2021 and could be abused by adversaries to run arbitrary code and cause a denial-of-service (DoS) condition.

Other important remediations include fixes for multiple remote code execution flaws in Chakra Scripting Engine (CVE-2021-42279), Microsoft Defender (CVE-2021-42298), Microsoft Virtual Machine Bus (CVE-2021-26443), Remote Desktop Client (CVE-2021-38666), and on-premises versions of Microsoft Dynamics 365 (CVE-2021-42316).

Lastly, the update is rounded by patches for a number of privilege escalation vulnerabilities affecting NTFS (CVE-2021-41367, CVE-2021-41370, CVE-2021-42283), Windows Kernel (CVE-2021-42285), Visual Studio Code (CVE-2021-42322), Windows Desktop Bridge (CVE-2021-36957), and Windows Fast FAT File System Driver (CVE-2021-41377)

Prevent Data Breaches

To install the latest security updates, Windows users can head to Start > Settings > Update & Security > Windows Update or by selecting Check for Windows updates.

Software Patches From Other Vendors

In addition to Microsoft, security updates have also been released by a number of other vendors to rectify several vulnerabilities, including —

Products You May Like

Articles You May Like

Amazon Prime Day 2024 Sale: Best Smart TV Deals Under Rs. 50,000
CrowdStrike Update Error Debacle: 5 Things to Know About Microsoft’s Global Outage
Amazon Prime Day: Top Deals on iPhone 15, iPhone 14, iPhone 13, and Other Models
CrowdStrike shares tank 15% in premarket after major outage hits businesses worldwide
Samsung Galaxy Ring Reportedly Works With Other Android Smartphones via Galaxy Wearable App

Leave a Reply

Your email address will not be published. Required fields are marked *