- Repsol se adhiere al Pacto por la IA de la Unión Europea
- 칼럼 | 공포, 불안, 음모론··· '드론 시대'에 오신 것을 환영합니다
- Revolutionizing policing: Kazakhstan’s trailblazing Digital Policeman initiative
- Transparency, efficiency, innovation: The digital transformation of policing in Kazakhstan
- 미 정부, TP-링크 공유기 사용 금지 검토 “공격 캠페인에 악용될 가능성”
VERT Threat Alert: June 2021 Patch Tuesday Analysis | The State of Security
Today’s VERT Alert addresses Microsoft’s June 2021 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-947 on Wednesday, June 9th.
In-The-Wild & Disclosed CVEs
CVE-2021-31955
This is one of two vulnerabilities fixed in today’s patch drop which were reported by Kaspersky Lab after detecting exploitation by threat actor PuzzleMaker. This Windows Kernel Information Disclosure could allow an attacker to read kernel memory via a user mode process via a vulnerable function call related to SuperFetch. The vulnerability in ntoskrnl.exe has been exploited in the wild.
Microsoft has rated this as Exploitation Detected on the latest software release on the Exploitability Index.
CVE-2021-31956
This is the second of two vulnerabilities fixed in today’s patch drop which were reported by Kaspersky Lab after detecting exploitation by threat actor PuzzleMaker. This vulnerability requires that an authenticated user execute code locally in order to exploit a heap-based buffer overflow in NTFS (ntfs.sys) that will allow for privilege escalation.
Microsoft has rated this as Exploitation Detected on the latest software release on the Exploitability Index.
CVE-2021-33739
This CVE describes a publicly disclosed and exploited vulnerability in Desktop Window Manager (DWM) Core that could lead to privilege escalation via the execution of a malicious script or executable by an authenticated user.
Microsoft has rated this as Exploitation Detected on the latest software release on the Exploitability Index.
CVE-2021-33742
Google’s Threat Analysis Group (TAG) reported this vulnerability in MSHTML that has been exploited in the wild to Microsoft. Microsoft has included an important to read FAQ entry on this vulnerability. They note that while Internet Explorer 11 is being retired on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying technology – MSHTML, EdgeHTML, and scripting platforms – are still supported. You can read more on the retirement in this Microsoft FAQ published last month. According to a tweet from Shane Huntley, this appears to be “a commercial exploit company providing capability for limited nation state Eastern Europe / Middle East targeting”
Microsoft has rated this as Exploitation Detected on the latest software release on the Exploitability Index.
CVE-2021-31201
This is the first of two vulnerabilities related to Adobe’s APSB21-29 security bulletin. A privilege escalation exists within the Microsoft Enhanced Cryptographic Provider that has been publicly exploited. Microsoft has indicate that you must install the June patch bundle in order to be protected against all three CVEs.
Microsoft has rated this as Exploitation Detected on the latest software release on the Exploitability Index.
CVE-2021-31199
This is the second of two vulnerabilities related to Adobe’s APSB21-29 security bulletin. A privilege escalation exists within the Microsoft Enhanced Cryptographic Provider that has been publicly exploited. Microsoft has indicate that you must install the June patch bundle in order to be protected against all three CVEs.
Microsoft has rated this as Exploitation Detected on the latest software release on the Exploitability Index.
CVE-2021-31968
This vulnerability has been disclosed but not publicly exploited and could allow a remote, unauthenticated attacker to perform a denial of service against Windows Remote Desktop Services.
Microsoft has rated this as Exploitation Less Likely on the latest software release on the Exploitability Index.
CVE Breakdown by Tag
While historical Microsoft Security Bulletin groupings are gone, Microsoft vulnerabilities are tagged with an identifier. This list provides a breakdown of the CVEs on a per tag basis.
Tag | CVE Count | CVEs |
Windows DCOM Server | 1 | CVE-2021-26414 |
.NET Core & Visual Studio | 1 | CVE-2021-31957 |
Visual Studio Code – Kubernetes Tools | 1 | CVE-2021-31938 |
Windows Bind Filter Driver | 1 | CVE-2021-31960 |
Windows Cryptographic Services | 2 | CVE-2021-31199, CVE-2021-31201 |
Windows Installer | 1 | CVE-2021-31973 |
Windows Common Log File System Driver | 1 | CVE-2021-31954 |
Windows Network File System | 3 | CVE-2021-31974, CVE-2021-31975, CVE-2021-31976 |
Microsoft Scripting Engine | 1 | CVE-2021-31959 |
Microsoft Office SharePoint | 7 | CVE-2021-26420, CVE-2021-31963, CVE-2021-31964, CVE-2021-31965, CVE-2021-31966, CVE-2021-31948, CVE-2021-31950 |
Microsoft Windows Codecs Library | 1 | CVE-2021-31967 |
Microsoft Office Excel | 1 | CVE-2021-31939 |
3D Viewer | 3 | CVE-2021-31942, CVE-2021-31943, CVE-2021-31944 |
Windows Kernel | 2 | CVE-2021-31951, CVE-2021-31955 |
Role: Hyper-V | 1 | CVE-2021-31977 |
Paint 3D | 3 | CVE-2021-31945, CVE-2021-31946, CVE-2021-31983 |
Microsoft DWM Core Library | 1 | CVE-2021-33739 |
Microsoft Office | 2 | CVE-2021-31940, CVE-2021-31941 |
Windows Defender | 2 | CVE-2021-31978, CVE-2021-31985 |
Windows Remote Desktop | 1 | CVE-2021-31968 |
Windows NTLM | 1 | CVE-2021-31958 |
Windows MSHTML Platform | 1 | CVE-2021-33742 |
Windows Event Logging Service | 1 | CVE-2021-31972 |
Windows Filter Manager | 1 | CVE-2021-31953 |
Windows Drivers | 1 | CVE-2021-31969 |
Microsoft Office Outlook | 1 | CVE-2021-31949 |
Windows TCP/IP | 1 | CVE-2021-31970 |
Windows Kerberos | 1 | CVE-2021-31962 |
Windows Kernel-Mode Drivers | 1 | CVE-2021-31952 |
Windows Print Spooler Components | 1 | CVE-2021-1675 |
Windows HTML Platform | 1 | CVE-2021-31971 |
Microsoft Edge (Chromium-based) | 1 | CVE-2021-33741 |
Microsoft Intune | 1 | CVE-2021-31980 |
Windows NTFS | 1 | CVE-2021-31956 |
Other Information
There were no advisories included in the June Security Guidance.