- What is AI networking? How it automates your infrastructure (but faces challenges)
- I traveled with a solar panel that's lighter than a MacBook, and it's my new backpack essential (and now get 23% off for Black Friday)
- Windows 11 24H2 hit by a brand new bug, but there's a workaround
- This Samsung OLED spoiled every other TV for me, and it's $1,400 off for Black Friday
- How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog
Tripwire Patch Priority Index for August 2021 | The State of Security
Tripwire’s August 2021 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft.
First on the patch priority list this month are patches for Microsoft Exchange Server (CVE-2021-34523, CVE-2021-34473, CVE-2021-31207). These vulnerabilities have seen active exploitation. Also, exploits for these vulnerabilities have been recently added to the Metasploit Exploit Framework. These systems should be patched as soon as possible.
Following Exchange, there is a patch available for a Windows LSA spoofing vulnerability. This vulnerability has been publicly disclosed with various research available explaining how to exploit this vulnerability. More details can be found at https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429
Next is a patch for Microsoft Scripting Engine, which resolves a memory corruption vulnerability.
Up next are patches for Microsoft Edge that resolves user after free, heap buffer overflow, and out-of-bounds write vulnerabilities.
Next are patches that affect components of the Windows operating systems. These patches resolve over 25 vulnerabilities, including elevation of privilege, information disclosure, and remote code execution vulnerabilities. These vulnerabilities affect core Windows, print spooler, bluetooth, MPEG-4 video decoder, event tracing, NFS, remote desktop client, TCP/IP, graphics and others.
Lastly, administrators should focus on server-side patches for Microsoft SharePoint and Dynamics. These patches resolve several issues including cross-site scripting, spoofing, and remote code execution vulnerabilities.
BULLETIN | CVE |
Exploit Framework – Metasploit | CVE-2021-34523, CVE-2021-34473, CVE-2021-31207 |
Windows LSA Spoofing Vulnerability | CVE-2021-36942 |
Microsoft Scripting Engine | CVE-2021-34480 |
Microsoft Edge | CVE-2021-30594, CVE-2021-30596, CVE-2021-30597, CVE-2021-30590, CVE-2021-30591, CVE-2021-30592, CVE-2021-30593 |
Microsoft Windows | CVE-2021-36937, CVE-2021-34537, CVE-2021-34483, CVE-2021-36936, CVE-2021-36947, CVE-2021-34486, CVE-2021-34487, CVE-2021-26425, CVE-2021-34534, CVE-2021-36948, CVE-2021-36945, CVE-2021-26431, CVE-2021-34533, CVE-2021-34530, CVE-2021-36938, CVE-2021-36926, CVE-2021-36932, CVE-2021-36933, CVE-2021-26433, CVE-2021-26432, CVE-2021-34535, CVE-2021-36927, CVE-2021-34536, CVE-2021-26426, CVE-2021-34484, CVE-2021-26424 |
Microsoft Office SharePoint | CVE-2021-36940 |
Microsoft Dynamics | CVE-2021-36950, CVE-2021-34524, CVE-2021-36946 |