- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- Two free ways to get a Perplexity Pro subscription for one year
- The 40+ best Black Friday PlayStation 5 deals 2024: Deals available now
- The 25+ best Black Friday Nintendo Switch deals 2024
- Why there could be a new AI chatbot champ by the time you read this
Tripwire Patch Priority Index for August 2021 | The State of Security
Tripwire’s August 2021 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft.
First on the patch priority list this month are patches for Microsoft Exchange Server (CVE-2021-34523, CVE-2021-34473, CVE-2021-31207). These vulnerabilities have seen active exploitation. Also, exploits for these vulnerabilities have been recently added to the Metasploit Exploit Framework. These systems should be patched as soon as possible.
Following Exchange, there is a patch available for a Windows LSA spoofing vulnerability. This vulnerability has been publicly disclosed with various research available explaining how to exploit this vulnerability. More details can be found at https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429
Next is a patch for Microsoft Scripting Engine, which resolves a memory corruption vulnerability.
Up next are patches for Microsoft Edge that resolves user after free, heap buffer overflow, and out-of-bounds write vulnerabilities.
Next are patches that affect components of the Windows operating systems. These patches resolve over 25 vulnerabilities, including elevation of privilege, information disclosure, and remote code execution vulnerabilities. These vulnerabilities affect core Windows, print spooler, bluetooth, MPEG-4 video decoder, event tracing, NFS, remote desktop client, TCP/IP, graphics and others.
Lastly, administrators should focus on server-side patches for Microsoft SharePoint and Dynamics. These patches resolve several issues including cross-site scripting, spoofing, and remote code execution vulnerabilities.
BULLETIN | CVE |
Exploit Framework – Metasploit | CVE-2021-34523, CVE-2021-34473, CVE-2021-31207 |
Windows LSA Spoofing Vulnerability | CVE-2021-36942 |
Microsoft Scripting Engine | CVE-2021-34480 |
Microsoft Edge | CVE-2021-30594, CVE-2021-30596, CVE-2021-30597, CVE-2021-30590, CVE-2021-30591, CVE-2021-30592, CVE-2021-30593 |
Microsoft Windows | CVE-2021-36937, CVE-2021-34537, CVE-2021-34483, CVE-2021-36936, CVE-2021-36947, CVE-2021-34486, CVE-2021-34487, CVE-2021-26425, CVE-2021-34534, CVE-2021-36948, CVE-2021-36945, CVE-2021-26431, CVE-2021-34533, CVE-2021-34530, CVE-2021-36938, CVE-2021-36926, CVE-2021-36932, CVE-2021-36933, CVE-2021-26433, CVE-2021-26432, CVE-2021-34535, CVE-2021-36927, CVE-2021-34536, CVE-2021-26426, CVE-2021-34484, CVE-2021-26424 |
Microsoft Office SharePoint | CVE-2021-36940 |
Microsoft Dynamics | CVE-2021-36950, CVE-2021-34524, CVE-2021-36946 |