Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • VERT Threat Alert: April 2021 Patch Tuesday Analysis
  • Cyber Attacks
  • Vulnerabilities

VERT Threat Alert: April 2021 Patch Tuesday Analysis

5 years ago Tyler Reguly
VERT Threat Alert: April 2021 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s April 2021 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-939 on Wednesday, April 14th.

In-The-Wild & Disclosed CVEs

CVE-2021-28310

Borin Larin of Kaspersky Lab discovered this vulnerability being actively used for exploitation and suspects that it is tied to the BITTER APT group. Larin and co-authors have released a detailed technical write-up on this vulnerability that impacts the Desktop Window Manager.

Microsoft has rated this as Exploit Detected on the latest software release on the Exploitability Index.

CVE-2021-28312

This publicly disclosed denial of service impacts the Windows NTFS file system. Windows 10 as well as Windows Server 2019 and Server version 20H2 are impacted.

Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.

CVE-2021-28437

A publicly disclosed information disclosure in the Windows Installer could allow attackers to read from the file system. Based on the Microsoft security guidance, all versions of Windows from Windows 7 to Windows 10 and their associated server platforms are vulnerable.

Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.

CVE-2021-28458

The final publicly exploited vuln this month is found in @azure/ms-rest-nodeauth, a node-js library for Azure authentication. The fix for this vulnerability was committed on March 23, 2021 and can reviewed on github.

Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.

CVE-2021-27091

This publicly disclosed privilege elevation vulnerability in the RPC Endpoint Mapper Service only affects older operating systems with patches available for Windows 7, Windows Server 2008 R2, and Windows Server 2012. 

Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.

CVE Breakdown by Tag

While historical Microsoft Security Bulletin groupings are gone, Microsoft vulnerabilities are tagged with an identifier. This list provides a breakdown of the CVEs on a per tag basis.

Tag CVE Count CVEs
Visual Studio Code – Kubernetes Tools 1 CVE-2021-28448
Microsoft NTFS 2 CVE-2021-27096, CVE-2021-28312
Open Source Software 1 CVE-2021-28458
Microsoft Office Word 1 CVE-2021-28453
Microsoft Windows Speech 3 CVE-2021-28347, CVE-2021-28351, CVE-2021-28436
Windows Resource Manager 1 CVE-2021-28320
Windows Installer 4 CVE-2021-26413, CVE-2021-26415, CVE-2021-28437, CVE-2021-28440
Visual Studio 1 CVE-2021-27064
Visual Studio Code – GitHub Pull Requests and Issues Extension 1 CVE-2021-28470
Windows Network File System 1 CVE-2021-28445
Microsoft Office SharePoint 1 CVE-2021-28450
Microsoft Windows Codecs Library 5 CVE-2021-27079, CVE-2021-28317, CVE-2021-28464, CVE-2021-28466, CVE-2021-28468
Visual Studio Code 6 CVE-2021-28457, CVE-2021-28469, CVE-2021-28471, CVE-2021-28475, CVE-2021-28477, CVE-2021-28473
Windows Application Compatibility Cache 1 CVE-2021-28311
Visual Studio Code – Maven for Java Extension 1 CVE-2021-28472
Microsoft Office Excel 4 CVE-2021-28449, CVE-2021-28451, CVE-2021-28454, CVE-2021-28456
Microsoft Graphics Component 4 CVE-2021-28318, CVE-2021-28348, CVE-2021-28349, CVE-2021-28350
Azure AD Web Sign-in 1 CVE-2021-27092
Windows Event Tracing 2 CVE-2021-27088, CVE-2021-28435
Windows Kernel 2 CVE-2021-27093, CVE-2021-28309
Windows Services and Controller App 1 CVE-2021-27086
Role: Hyper-V 4 CVE-2021-26416, CVE-2021-28314, CVE-2021-28441, CVE-2021-28444
Microsoft Exchange Server 4 CVE-2021-28480, CVE-2021-28481, CVE-2021-28482, CVE-2021-28483
Windows ELAM 1 CVE-2021-27094
Windows Remote Procedure Call Runtime 27 CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28338, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434
Microsoft Internet Messaging API 1 CVE-2021-27089
Windows Registry 1 CVE-2021-27091
Azure Sphere 1 CVE-2021-28460
Windows AppX Deployment Extensions 1 CVE-2021-28326
Windows Diagnostic Hub 3 CVE-2021-28313, CVE-2021-28321, CVE-2021-28322
Windows Portmapping 1 CVE-2021-28446
Windows Overlay Filter 1 CVE-2021-26417
Windows Secure Kernel Mode 1 CVE-2021-27090
Windows Win32K 2 CVE-2021-27072, CVE-2021-28310
Microsoft Office Outlook 1 CVE-2021-28452
Windows TCP/IP 3 CVE-2021-28319, CVE-2021-28439, CVE-2021-28442
Windows Early Launch Antimalware Driver 1 CVE-2021-28447
Microsoft Windows DNS 2 CVE-2021-28323, CVE-2021-28328
Windows SMB Server 2 CVE-2021-28324, CVE-2021-28325
Windows Media Player 2 CVE-2021-27095, CVE-2021-28315
Microsoft Edge (Chromium-based) 6 CVE-2021-21194, CVE-2021-21195, CVE-2021-21196, CVE-2021-21197, CVE-2021-21198, CVE-2021-21199
Windows WLAN Auto Config Service 1 CVE-2021-28316
Azure DevOps 2 CVE-2021-27067, CVE-2021-28459
Windows Console Driver 2 CVE-2021-28438, CVE-2021-28443

The post ” VERT Threat Alert: April 2021 Patch Tuesday Analysis” appeared first on TripWire

Source:TripWire – Tyler Reguly

Tags: APT, Exploit, Java, Microsoft, Patch Tuesday, TripWire, Vulnerability

Continue Reading

Previous How the NAME:WRECK Bugs Impact Consumers, Businesses
Next Protecting Your Electronic Health Records (EHR) With Continuous Monitoring

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

13 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More

18 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them

20 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

21 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

23 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

1 day ago [email protected] (The Hacker News)

Recent Posts

  • North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
  • ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
  • We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them
  • Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware
  • Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT