9 June 2021

Microsoft fixes 6 zero-days exploited in the wild


Microsoft fixes 6 zero-days exploited in the wild

Microsoft has released a new batch of security updates for Windows and other supported software that fix a total of 50 security vulnerabilities including six zero-day issues that are said to be exploited in real-world attacks.

The six zero-days are as follows:

CVE-2021-31955 - Windows Kernel Information Disclosure Vulnerability

CVE-2021-31956 - Windows NTFS Elevation of Privilege Vulnerability

CVE-2021-33739 - Microsoft DWM Core Library Elevation of Privilege Vulnerability

CVE-2021-33742 - Windows MSHTML Platform Remote Code Execution Vulnerability

CVE-2021-31199 - Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability

CVE-2021-31201 - Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability

While Microsoft did not share additional details on vulnerabilities or the nature of attacks exploiting them, researchers from Kaspersky shed some light on a couple of bugs, namely CVE-2021-31955 and CVE-2021-31956. According to the cybersecurity firm, a new threat actor named PuzzleMaker has been observed leveraging these flaws as well as a Google Chrome zero-day exploit chain in highly targeted attacks against companies across the world.

June’s Patch Tuesday release also patches a number of high-risk vulnerabilities affecting Microsoft Defender, Exel, Microsoft Kerberos AppContainer, Microsoft VP9 Video Extensions, Microsoft Office Graphics, and other products.


Back to the list

Latest Posts

New Chinese-speaking cyberespionage group targets high-profile victims in Southeast Asia

New Chinese-speaking cyberespionage group targets high-profile victims in Southeast Asia

Dubbed GhostEmperor, the threat actor has been observed using a never-before-seen Windows kernel-mode rootkit.
2 August 2021
APT29 still actively serving WellMess malware used in cyberespionage campaign targeting COVID-19 vaccine research

APT29 still actively serving WellMess malware used in cyberespionage campaign targeting COVID-19 vaccine research

Researchers discovered more than 30 command-and-control servers under control of APT29 that were delivering WellMess.
2 August 2021
SolarWinds hackers compromised email accounts of employees at 27 US Attorneys' offices

SolarWinds hackers compromised email accounts of employees at 27 US Attorneys' offices

The hackers are believed to have had access to compromised accounts from approximately May 7 to December 27, 2020.
2 August 2021