Critical Windows Update: Address 117 Security Flaws, Including 9 Active Zero-Days

July 14, 2021

Microsoft has released its July Patch Tuesday updates, addressing a total of 117 security vulnerabilities, among which are nine zero-day flaws—four of which are currently being exploited in the wild, potentially allowing attackers to gain control of affected systems. Out of these vulnerabilities, 13 are classified as Critical, 103 as Important, and one as Moderate in severity. Notably, six of these vulnerabilities were publicly known at the time of the update.

The updates affect a wide range of Microsoft products, including Windows, Bing, Dynamics, Exchange Server, Office, the Scripting Engine, Windows DNS, and Visual Studio Code. This month saw a significant increase in the number of vulnerabilities patched, surpassing the totals from May (55) and June (50).

Among the most critical actively exploited vulnerabilities are:

  • CVE-2021-34527 (CVSS Score: 8.8) – Windows Print Spooler Remote Code Execution…

Microsoft Addresses 117 Security Vulnerabilities in July Patch Update, Including Nine Zero-Day Flaws

Microsoft has released its July Patch Tuesday updates, addressing a total of 117 security vulnerabilities across a wide range of its products. Among these, there are nine critical zero-day flaws, four of which are reportedly under active exploitation in the wild. These vulnerabilities pose a significant risk, potentially allowing attackers to gain control over affected systems.

The severity ratings of the vulnerabilities reveal a concerning landscape—13 issues are categorized as Critical, while 103 are rated Important, with one classified as Moderate. Notably, six of these vulnerabilities were publicly known at the time of release. The affected products include essential tools and software like Windows, Bing, Dynamics, Exchange Server, Office, the Scripting Engine, Windows DNS, and Visual Studio Code.

This month’s updates represent a dramatic increase in vulnerability volume, surpassing the combined total of 105 flaws addressed in May and June. This escalation in potential security risks underscores the urgency for organizations to implement these updates promptly.

One of the most critical vulnerabilities is identified as CVE-2021-34527, which has a CVSS score of 8.8. This flaw within the Windows Print Spooler could allow for remote code execution, signifying an immediate threat to users and organizations utilizing this service. Organizations are urged to prioritize patching these vulnerabilities to safeguard their systems against potential intrusions.

The primary target of these vulnerabilities is, therefore, the wide array of businesses that utilize Microsoft products as part of their operational infrastructure. Given the global reach of Microsoft’s services, the implications of these vulnerabilities extend to organizations based in various countries, including the United States.

In terms of potential attack methodologies, the MITRE ATT&CK framework can provide context to understanding how adversaries might exploit these vulnerabilities. Techniques such as initial access, where an attacker gains a foothold in a target system, and privilege escalation, allowing elevated access to sensitive areas of the network, are likely avenues for exploitation.

Organizations must remain vigilant, ensuring that they implement the latest updates to mitigate risks associated with these vulnerabilities. By adopting a proactive approach to cybersecurity—incorporating regular updates and understanding adversarial tactics—business owners can better protect their operational environments from increasingly sophisticated threats.

As the cybersecurity landscape evolves, staying informed and proactive about potential vulnerabilities is essential for maintaining security and safeguarding sensitive data. The significant number of flaws addressed this month serves as a crucial reminder of the ongoing threats facing organizations today.

Source link