Security Market Segment LS
Wednesday, 10 November 2021 09:30

Microsoft patches two actively exploited zero-days in monthly fixes Featured

By
Microsoft patches two actively exploited zero-days in monthly fixes Pixabay

Two actively exploited zero-day vulnerabilities are among 55 flaws fixed by Microsoft in its monthly Patch Tuesday, with four other zero-days also being remedied.

Apart from the six zero-days, all other bugs were rated as important, the second highest ranking on Microsoft's threat index.

One of the bugs being exploited in the wild is in Microsoft Exchange Server and can lead to remote code execution. Exchange Server has been dogged by serious bugs for quite some time.

"Several notable vulnerabilities have been disclosed in Microsoft Exchange Server throughout 2021, starting with ProxyLogon and associated zero-days in March, later followed by ProxyShell," a blog post from the security firm Tenable said.

"Organisations that run Exchange Server on-premises should apply security updates in a timely manner to prevent future exploitation once proof-of-concept code becomes publicly available."

Fifteen of the bugs fixed could be used for remote code execution, the company's list of vulnerabilities shows.

The other actively exploited zero-day was a security feature bypass flaw in Microsoft Excel.

Very little information is available about this bug. Last month, Microsoft announced that it would be disabling macros as a default feature in Excel 4.0. But more recently, the company announced that it would be providing a JavaScript API for Excel.

Satnam Narang, a staff research engineer at Tenable, said: "This month's release includes a fix for CVE-2021-42321, a critical remote code execution vulnerability in Microsoft Exchange Server due to issues with the validation of command-let (cmdlet) arguments.

"In order to exploit this flaw, an attacker would need to be authenticated, which limits some of the impact. Microsoft says they are aware of "limited targeted attacks" using this vulnerability in the wild.

"Microsoft Exchange Server has been the subject of several notable vulnerabilities throughout 2021, from ProxyLogon and associated vulnerabilities, as well as ProxyShell.

"Though unconfirmed, this may be similar to an Exchange Server vulnerability that was discovered at the Tianfu Cup hacking competition last month. We strongly encourage organisations to apply these patches as soon as possible.

"Microsoft also patched CVE-2021-42292, a security feature bypass vulnerability in Microsoft Excel. Microsoft's Security Threat Intelligence Center is credited with discovering this flaw, and they say that it was exploited in the wild as a zero-day.

"Microsoft says that the Outlook Preview Pane is not an attack vector for this vulnerability, so a target would need to open the file in order for exploitation to occur. Updates are primarily available for Windows systems, but updates for Office for Mac are not yet published."

Update, 11 November: Danny Kim, the principal architect at security firm Virsec, commented: "I think the CVE-2021-42298 vulnerability found in Microsoft Defender is the most concerning. With the Exploitability assessment of 'Exploitation more likely', the severity score and the repeatability of this attack, I think this CVE should be top of mind for all enterprises.

"Windows Defender runs on all supported versions of Windows. This vulnerability significantly increases the potential attack surface for organisations due to the popularity of Windows Defender. This CVE does require some user interaction; however, we have seen in the past how attackers can use social engineering/phishing emails to achieve such interaction fairly easily.

"CVE-2021-26443 is also a dangerous vulnerability that allows an attacker to escape a virtual machine and execute arbitrary code on the host itself. VMs are popular, especially among Windows users, as a way to deploy more than one Windows machine on the same physical host.

"VMs offer virtualisation protection so that anything running in the VM cannot escape and run on the physical host. This vulnerability, if exploited, allows an attacker to escape this protection and access the physical host.

"This means the attacker can inflict damage not only on the VM he/she infiltrated, but all VMs running on that physical host. Gaining access and having the ability to run arbitrary code on a physical host is one of the deepest levels of infiltration an attacker can achieve." 


Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinatrs and campaigns and assassistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

VENDOR NEWS