Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • VERT Threat Alert: October 2021 Patch Tuesday Analysis
  • Cyber Attacks
  • Vulnerabilities

VERT Threat Alert: October 2021 Patch Tuesday Analysis

4 years ago Tyler Reguly
VERT Threat Alert: May 2021 Patch Tuesday Analysis

Today’s VERT Alert addresses Microsoft’s October 2021 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-968 on Wednesday, October 13th.

In-The-Wild & Disclosed CVEs

CVE-2021-40449

Up first this month, we have an elevation of privilege in Win32k that has been exploited in-the-wild via MysterySnail. This vulnerability appears to impact all systems from Windows 7 to the newly released Windows 11.

Microsoft has rated this as Exploitation Detected on the latest software release on the Exploitability Index.

CVE-2021-40469

This remote code execution vulnerability in the Microsoft DNS server impacts all operating systems from Server 2008 to Server 2022. Only servers with the DNS Server role configured are impacted by the vulnerability.

Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.

CVE-2021-41335

A publicly disclosed vulnerability in the Windows Kernel could lead to privilege escalation. Unlike CVE-2021-40449, this vulnerability does not include Windows 11 and Windows Server 2022.

Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.

CVE-2021-41338

This vulnerability was originally closed by Microsoft Security as a “Won’t Fix” issue. They have since reconsidered and issued an update. The vulnerability was discovered by Google Project Zero’s James Forshaw and is detailed here with the specific Project Zero issue tracked here.

Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.

CVE Breakdown by Tag

While historical Microsoft Security Bulletin groupings are gone, Microsoft vulnerabilities are tagged with an identifier. This list provides a breakdown of the CVEs on a per tag basis. Vulnerabilities are also color coded to aid with identifying key issues.

  • Traditional Software
  • Mobile Software
  • Cloud or Cloud Adjacent
  • Vulnerabilities that are being exploited or that have been disclosed will be bold
Tag CVE Count CVEs
.NET Core & Visual Studio 1 CVE-2021-41355
Windows Fastfat Driver 2 CVE-2021-38662, CVE-2021-41343
Console Window Host 1 CVE-2021-41346
Microsoft Office Word 1 CVE-2021-40486
HTTP.sys 1 CVE-2021-26442
Windows Installer 1 CVE-2021-40455
Visual Studio 3 CVE-2021-3450, CVE-2021-3449, CVE-2020-1971
Microsoft Dynamics 3 CVE-2021-40457, CVE-2021-41353, CVE-2021-41354
Windows Storage Spaces Controller 5 CVE-2021-40478, CVE-2021-40488, CVE-2021-40489, CVE-2021-26441, CVE-2021-41345
Windows DirectX 1 CVE-2021-40470
Windows AppX Deployment Service 1 CVE-2021-41347
Microsoft Office SharePoint 5 CVE-2021-41344, CVE-2021-40482, CVE-2021-40483, CVE-2021-40484, CVE-2021-40487
Microsoft Windows Codecs Library 3 CVE-2021-40462, CVE-2021-41330, CVE-2021-41331
Windows Cloud Files Mini Filter Driver 1 CVE-2021-40475
Microsoft Office Excel 6 CVE-2021-40471, CVE-2021-40472, CVE-2021-40473, CVE-2021-40474, CVE-2021-40479, CVE-2021-40485
Microsoft Graphics Component 1 CVE-2021-41340
Windows Event Tracing 1 CVE-2021-40477
Windows Kernel 2 CVE-2021-41335, CVE-2021-41336
Microsoft Exchange Server 4 CVE-2021-34453, CVE-2021-41348, CVE-2021-41350, CVE-2021-26427
Windows Nearby Sharing 1 CVE-2021-40464
Rich Text Edit Control 1 CVE-2021-40454
Windows Remote Procedure Call Runtime 1 CVE-2021-40460
Active Directory Federation Services 1 CVE-2021-41361
Windows AppContainer 2 CVE-2021-40476, CVE-2021-41338
Windows Bind Filter Driver 1 CVE-2021-40468
Windows Desktop Bridge 1 CVE-2021-41334
Windows Network Address Translation (NAT) 1 CVE-2021-40463
Windows MSHTML Platform 1 CVE-2021-41342
Role: DNS Server 1 CVE-2021-40469
Windows Win32K 3 CVE-2021-40449, CVE-2021-40450, CVE-2021-41357
Windows TCP/IP 1 CVE-2021-36953
Microsoft DWM Core Library 1 CVE-2021-41339
Windows Print Spooler Components 2 CVE-2021-36970, CVE-2021-41332
Role: Windows Hyper-V 2 CVE-2021-38672, CVE-2021-40461
Windows exFAT File System 1 CVE-2021-38663
Microsoft Edge (Chromium-based) 7 CVE-2021-37974, CVE-2021-37975, CVE-2021-37976, CVE-2021-37977, CVE-2021-37978, CVE-2021-37979, CVE-2021-37980
Role: Windows AD FS Server 1 CVE-2021-40456
Microsoft Office Visio 2 CVE-2021-40480, CVE-2021-40481
Windows Text Shaping 1 CVE-2021-40465
Microsoft Intune 1 CVE-2021-41363
Windows Common Log File System Driver 3 CVE-2021-40443, CVE-2021-40466, CVE-2021-40467
Role: Windows Active Directory Server 1 CVE-2021-41337
System Center 1 CVE-2021-41352

Other Information

There were no new advisories included with the October Security Guidance, but there was one update.

ADV200011 – Microsoft Guidance for Addressing Security Feature Bypass in GRUB

Microsoft has updated their advisory on GRUB related to a number of vulnerabilities released in July 2020 and March 2021. The update indicates that newer versions of Windows, including Windows 11, are affected and that an update will be released to address this in Spring 2022.

The post ” VERT Threat Alert: October 2021 Patch Tuesday Analysis” appeared first on TripWire

Source:TripWire – Tyler Reguly

Tags: Cloud, Google, Microsoft, Patch Tuesday, TripWire, Vulnerability

Continue Reading

Previous Microsoft Kills Bug Being Exploited in MysterySnail Espionage Campaign
Next Update Your Windows PCs Immediately to Patch New 0-Day Under Active Attack

More Stories

  • Cyber Attacks
  • Data Breach

LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

1 hour ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

5 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

The Kill Chain Is Obsolete When Your AI Agent Is the Threat

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

7 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

12 hours ago [email protected] (The Hacker News)

Recent Posts

  • LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace
  • GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data
  • The Kill Chain Is Obsolete When Your AI Agent Is the Threat
  • Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
  • Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT