Microsoft patches actively exploited Internet Explorer flaw | #firefox | #chrome | #microsoftedge

Microsoft has fixed dozens of security flaws across its suite of products, including a critical Internet Explorer bug that’s been previously exploited by state-backed North Korean hackers to attack security researchers.

The flaw, tracked as CVE-2021-26411, is a memory corruption vulnerability that’s allowed hackers to run malware on victims’ machines by luring them into accessing a malicious website.

This is the fifth actively exploited Microsoft vulnerability to be patched in recent weeks, after four Microsoft Exchange Server flaws were disclosed last week. 

These five fixes were included in the latest Patch Tuesday wave of updates among 89 patches across Microsoft products, including fixes for 14 critically-rated vulnerabilities.

The latest actively-exploited remote code exploitation flaw affects Internet Explorer versions 9 and 11, as well as the HTML-based Microsoft Edge, which itself reached end-of-life today. Internet Explorer will stop being supported with updates from 17 August this year.

The Internet Explorer vulnerability was previously reported as a zero-day by the South Korean security firm Enki in February, which itself was targeted by hackers exploiting the bug.  

To trigger the exploit, an attacker would first have to craft a website, or take advantage of a compromised website and convince a user to view it. This would usually be done by undergoing a phishing exercise, either by sending an email or text message or prompting users to download a malicious email attachment.

Related Resource

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

cost of a data breach report 2020 - whitepaper from IBMDownload now

The discovery of a sixth actively-exploited flaw in recent weeks is sure to raise alarms considering the potentially devastating effects that the recent Microsoft Exchange Server exploitation has rendered.

The White House weighed in over the weekend, advising businesses to patch their systems immediately due to the risk of intrusion, with security researchers warning there could be hundreds of thousands of prospective victims across the world. One organisation that’s among the first confirmed victims of the attacks is the European Banking Authority. 

Featured Resources

The ultimate guide to going mobile for fire/emergency medical services

Get your free guide to going mobile for fire services and EMS

Free download

VMware Cloud workload migration tools

Cloud migration types, phases, and strategies

Free download

Eight steps to fight ransomware

Insights into how you can protect yourself from this ever increasing threat

Free Download

IDC: The business value of Avi Vantage

A study of enterprises using next-generation application delivery

Free download

Original Source by [author_name]

Leave a Reply

Your email address will not be published. Required fields are marked *

twenty one − fourteen =