Security Market Segment LS
Wednesday, 13 October 2021 09:33

Microsoft patches 71 flaws, including one zero-day Featured

Microsoft patches 71 flaws, including one zero-day Pixabay

Seventy-one flaws have been patched in Microsoft's products, the company announced on Tuesday, the monthly Patch Tuesday.

One vulnerability — CVE-2021-40449 — for which a patch was issued was being exploited in the wild, the Russian security firm Kaspersky reported in a separate blog post. However, Microsoft marked this issue as Important, the second level on its scale. A total of four zero-days were patched, three of which had been made public earlier.

The NSA reported one of the vulnerabilities, CVE-2021-26427, but Microsoft said it was less likely to be exploited, despite being a remote code execution flaw in  Microsoft Exchange Server.

Kaspersky researchers Boris Lanin and Costin Raiu said they had detected multiple attacks making use of the elevation of privileges flaw on multiple Windows servers.

"The exploit had numerous debug strings from an older, publicly known exploit for vulnerability CVE-2016-3309, but closer analysis revealed that it was a zero-day," the pair said.

"We discovered that it was using a previously unknown vulnerability in the Win32k driver and exploitation relies heavily on a technique to leak the base addresses of kernel modules.

"We promptly reported these findings to Microsoft. The information disclosure portion of the exploit chain was identified as not bypassing a security boundary, and was therefore not fixed.

"Microsoft assigned CVE-2021-40449 to the use-after-free vulnerability in the Win32k kernel driver and it was patched on 12 October as a part of the October Patch Tuesday."

Of the 71 vulnerabilities patched, two had Microsoft's highest rating of critical. Apart from Windows, bugs were fixed in Edge, Microsoft Exchange, Microsoft Office Services and SharePoint Server.

Ryan Naraine, a veteran security journalist, said in his report that thus far there had been 73 zero-day attacks in the wild. Most took advantage of vulnerable code in products sold by Microsoft, Apple and Google.

Raiu and Lanin said the exploit they had found for CVE-2021-40449 could attack the following Microsoft products:

  • Windows Vista
  • Windows 7
  • Windows 8
  • Windows 8.1
  • Windows Server 2008
  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows 10 (build 14393)
  • Windows Server 2016 (build 14393)
  • Windows 10 (build 17763)
  • Windows Server 2019 (build 17763)

"CVE-2021-40449 is a use-after-free vulnerability in Win32k’s NtGdiResetDC function," the pair said.

"As with many other Win32k vulnerabilities, the root cause of this vulnerability lies in the ability to set user-mode callbacks and execute unexpected API functions during execution of those callbacks.

"The CVE-2021-40449 is triggered when the function ResetDC is executed a second time for the same handle during execution of its own callback."

Raiu and Lanin said they had analysed the malware payload used along with the zero-day exploit, and found that variants were detected in widespread espionage campaigns against IT companies, military/defence contractors, and diplomatic entities.

"We are calling this cluster of activity MysterySnail. Code similarity and re-use of C2 infrastructure we discovered allowed us to connect these attacks with the actor known as IronHusky and Chinese-speaking APT activity dating back to 2012," the pair said.

Satnam Narang, a regular commentator on vulnerabilities for iTWire, said a total of 74 CVEs had been patched.

"This month's Patch Tuesday release includes fixes for 74 CVEs, three of which are rated critical, including one vulnerability that was exploited in the wild as a zero-day," said Narang, a staff research engineer with security outfit Tenable.

"This month's release includes a fix for CVE-2021-36970, a spoofing vulnerability in Microsoft's Windows Print Spooler. The vulnerability was discovered by researchers XueFeng Li and Zhiniang Peng of Sangfor. They were also credited with the discovery of CVE-2021-1675, one of two vulnerabilities known as PrintNightmare.

"While no details have been shared publicly about the flaw, this is definitely one to watch for, as we saw a constant stream of Print Spooler-related vulnerabilities patched over the summer while ransomware groups began incorporating PrintNightmare into their affiliate playbook.

"We strongly encourage organisations to apply these patches as soon as possible. Microsoft also patched CVE-2021-40449, an elevation of privilege vulnerability in Win32k.

"According to reports, this flaw was exploited in the wild as a zero-day. It is not uncommon to see zero-day elevation of privilege flaws patched during Patch Tuesday.

"These flaws are most valuable in post-compromise scenarios once an attacker has gained access to a target system through other means, in order to execute code with elevated privileges."

Read 1707 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


Thoughtworks presents XConf Australia, back in-person in three cities, bringing together people who care deeply about software and its impact on the world.

In its fifth year, XConf is our annual technology event created by technologists for technologists.

Participate in a robust agenda of talks as local thought leaders and Thoughtworks technologists share first-hand experiences and exchange new ways to empower teams, deliver quality software and drive innovation for responsible tech.

Explore how at Thoughtworks, we are making tech better, together.

Tickets are now available and all proceeds will be donated to Indigitek, a not-for-profit organisation that aims to create technology employment pathways for First Nations Peoples.

Click the button below to register and get your ticket for the Melbourne, Sydney or Brisbane event



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News