Microsoft Releases Patches for Active 0-Day Vulnerability and 55 Other Windows Flaws

On February 10, 2021, Microsoft addressed a total of 56 vulnerabilities, including a critical 0-day exploit that is currently being targeted in the wild. Among these, 11 vulnerabilities are classified as Critical, 43 as Important, and 2 as Moderate in severity, with six being previously disclosed. The updates enhance security across various platforms, including .NET Framework, Azure IoT, Microsoft Dynamics, Microsoft Edge for Android, Microsoft Exchange Server, Microsoft Office, Windows Codecs Library, Skype for Business, Visual Studio, Windows Defender, and key system components such as Kernel, TCP/IP, Print Spooler, and Remote Procedure Call (RPC).

The most critical vulnerability addressed is a Windows Win32k privilege escalation issue (CVE-2021-1732, CVSS score 7.8), which could allow attackers with access to a system to execute malicious code with elevated privileges. Microsoft acknowledges the contributions of JinQuan, MaDongZe, TuXiaoYi, and LiHao from DBAPPSecurity in identifying this vulnerability.

Microsoft Releases Security Updates Addressing 0-Day Vulnerability and 55 Additional Windows Flaws

On February 10, 2021, Microsoft rolled out critical updates targeting 56 vulnerabilities, among which is a severe exploit that is currently being actively utilized in cyber-attacks. The updates categorize 11 vulnerabilities as Critical, 43 as Important, and 2 as Moderate, with six of these issues having been previously disclosed.

The patches encompass a broad range of Microsoft products, including the .NET Framework, Azure IoT, Microsoft Dynamics, Microsoft Edge for Android, Microsoft Exchange Server, Microsoft Office, as well as core components such as the Windows Codecs Library, Skype for Business, Visual Studio, Windows Defender, and essential system elements like the Kernel, TCP/IP, Print Spooler, and Remote Procedure Call (RPC) services.

The most critical of these vulnerabilities is a Windows Win32k privilege escalation flaw (CVE-2021-1732), which carries a CVSS score of 7.8. This vulnerability enables attackers with access to a compromised system to execute malicious code with elevated privileges, granting them extensive control over the affected system. The discovery of this flaw has been attributed to experts from DBAPPSecurity: JinQuan, MaDongZe, TuXiaoYi, and LiHao.

In terms of targets, businesses running any of the affected Microsoft products are particularly at risk. Given the widespread adoption of these applications, organizations across various sectors could be exposed to potential exploitation by threat actors.

This situation highlights the need for heightened vigilance in cybersecurity practices. Attackers may employ tactics outlined in the MITRE ATT&CK framework, specifically strategies related to initial access or privilege escalation. The ability to execute malicious code via a privilege escalation technique indicates a possible focus on gaining further control over user environments, which could lead to more severe breaches.

As the cyber landscape continues to evolve, the importance of timely patch management becomes increasingly critical. Business owners are urged to promptly implement these updates in order to protect their systems from emerging threats. In light of these developments, companies should reinforce their cybersecurity measures and stay informed on best practices to safeguard against similar vulnerabilities in the future.

Source link