Tripwire Patch Priority Index for September 2021 | The State of Security


Tripwire’s September 2021 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft, Adobe, Linux, and Confluence.

First on the patch priority list this month are patches for the Linux kernel (CVE-2021-3490) and Confluence Server and Data Center (CVE-2021-26084). Exploits for these vulnerabilities have been recently added to the Metasploit Exploit Framework. These systems should be patched as soon as possible.

Up next are patches for Microsoft Edge that resolve information disclosure and use after free vulnerabilities.

Next are patches for Microsoft Office, Excel, and Access. These patches resolve remote code execution and spoofing vulnerabilities.

Up next are patches for Adobe Reader and Acrobat that resolve type confusion, buffer overflow, information disclosure, out-of-bound read, out-of-bounds write, and user after free vulnerabilities.

Next are patches that affect components of the Windows operating systems. These patches resolve over 30 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, remote code execution, and remote code execution vulnerabilities. These vulnerabilities affect core Windows, print spooler, storage, installer, common log file system driver, authenticode, ancillary function driver, kernel, subsystem for Linux, SMB, update client, and others.

Lastly, administrators should focus on server-side patches for Microsoft SharePoint and Windows DNS. These patches resolve several issues including spoofing and elevation of privilege vulnerabilities.

BULLETIN CVE
Exploit Framework – Metasploit CVE-2021-3490, CVE-2021-26084
Microsoft Edge CVE-2021-37976, CVE-2021-37975, CVE-2021-37974
Microsoft Office Excel CVE-2021-38655, CVE-2021-38660
Microsoft Office CVE-2021-38658, CVE-2021-38650
Microsoft Office Access CVE-2021-38646
APSB21-55 Adobe Reader and Acrobat CVE-2021-39841, CVE-2021-39863, CVE-2021-39857, CVE-2021-39856, CVE-2021-39855, CVE-2021-39844, CVE-2021-39861, CVE-2021-39858, CVE-2021-39843, CVE-2021-39846, CVE-2021-39845, CVE-2021-35982, CVE-2021-39859, CVE-2021-39840, CVE-2021-39842, CVE-2021-39839, CVE-2021-39838, CVE-2021-39837, CVE-2021-39836, CVE-2021-39860, CVE-2021-39852, CVE-2021-39854, CVE-2021-39853, CVE-2021-39850, CVE-2021-39849, CVE-2021-39851
Microsoft Windows CVE-2021-38637, CVE-2021-38624, CVE-2021-36961, CVE-2021-36962, CVE-2021-36963, CVE-2021-36955, CVE-2021-38633, CVE-2021-36959, CVE-2021-36969, CVE-2021-38635, CVE-2021-38636, CVE-2021-36973, CVE-2021-38628, CVE-2021-38638, CVE-2021-36964, CVE-2021-38630, CVE-2021-38626, CVE-2021-38625, CVE-2021-38629, CVE-2021-36954, CVE-2021-36966, CVE-2021-40444, CVE-2021-26435, CVE-2021-38639, CVE-2021-36975, CVE-2021-40447, CVE-2021-38671, CVE-2021-38667, CVE-2021-38632, CVE-2021-36967, CVE-2021-36965, CVE-2021-36974, CVE-2021-36960, CVE-2021-36972, CVE-2021-38634
Microsoft Office SharePoint CVE-2021-38652, CVE-2021-38651
Microsoft Windows DNS CVE-2021-36968



Source link