VERT Threat Alert: October 2021 Patch Tuesday Analysis | #microsoft | #hacking | #cybersecurity


Today’s VERT Alert addresses Microsoft’s October 2021 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-968 on Wednesday, October 13th.

In-The-Wild & Disclosed CVEs

CVE-2021-40449

Up first this month, we have an elevation of privilege in Win32k that has been exploited in-the-wild via MysterySnail. This vulnerability appears to impact all systems from Windows 7 to the newly released Windows 11.

Microsoft has rated this as Exploitation Detected on the latest software release on the Exploitability Index.

CVE-2021-40469

This remote code execution vulnerability in the Microsoft DNS server impacts all operating systems from Server 2008 to Server 2022. Only servers with the DNS Server role configured are impacted by the vulnerability.

Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.

CVE-2021-41335

A publicly disclosed vulnerability in the Windows Kernel could lead to privilege escalation. Unlike CVE-2021-40449, this vulnerability does not include Windows 11 and Windows Server 2022.

Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.

CVE-2021-41338

This vulnerability was originally closed by Microsoft Security as a “Won’t Fix” issue. They have since reconsidered and issued an update. The vulnerability was discovered by Google Project Zero’s James Forshaw and is detailed here with the specific Project Zero issue tracked here.

Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.

CVE Breakdown by Tag

While historical Microsoft Security Bulletin groupings are gone, Microsoft vulnerabilities are tagged with an identifier. This list provides a breakdown of the CVEs on a per tag basis. Vulnerabilities are also color coded to aid with identifying key issues.

  • Traditional Software
  • Mobile Software
  • Cloud or Cloud Adjacent
  • Vulnerabilities that are being exploited or that have been disclosed (Read more…)



Original Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

+ forty four = 45