

- #OUTLOOK FOR MAC UPGRADES PATCH#
- #OUTLOOK FOR MAC UPGRADES WINDOWS 10#
- #OUTLOOK FOR MAC UPGRADES CODE#
Researcher Orange Tsai commenting that nobody guessed the remote zero-day he reported on Jan. One of the bugs is credited to Orange Tsai of the DEVCORE research team, who was responsible for disclosing the ProxyLogon Exchange Server vulnerability that was patched in an out-of-band release back in March. Microsoft also patched four more security holes its Exchange Server corporate email platform, which recently was besieged by attacks on four other zero-day Exchange flaws that resulted in hundreds of thousands of servers worldwide getting hacked. You’ll also note this CVE is from 2020, which could indicate Microsoft has been working on this fix for some time.” “It’s not clear what the range on such an attack would be, but you should assume some proximity is needed.
#OUTLOOK FOR MAC UPGRADES PATCH#
“This patch fixes a vulnerability that could allow an attacker to disclose the contents of encrypted wireless packets on an affected system,” he said. All other web browsing should be performed with a supported browser.”Īnother curious bug fixed this month is CVE-2020-24587, described as a “Windows Wireless Networking Information Disclosure Vulnerability.” ZDI’s Childs said this one has the potential to be pretty damaging. “If you are an organization that has to provide IE11 to support legacy applications, consider enforcing a policy on the users that restricts the domains that can be accessed by IE11 to only those legacy applications. “IE needs to die – and I’m not the only one that thinks so,” Breen said. As this specific exploit would not require any form of authentication, it’s even more appealing for attackers, and any organization using HTTP.sys protocol stack should prioritize this patch.”īreen also called attention to CVE-2021-26419 - a vulnerability in Internet Explorer 11 - to make the case for why IE needs to stand for “Internet Exploder.” To trigger this vulnerability, a user would have to visit a site that is controlled by the attacker, although Microsoft also recognizes that it could be triggered by embedding ActiveX controls in Office Documents. “Wormable exploits should always be a high priority, especially if they are for services that are designed to be public facing. “For ransomware operators, this kind of vulnerability is a prime target for exploitation,” Breen said. Kevin Breen from Immersive Labs said the fact that this one is just 0.2 points away from a perfect 10 CVSS score should be enough to identify just how important it is to patch. Definitely put this on the top of your test-and-deploy list.”

#OUTLOOK FOR MAC UPGRADES WINDOWS 10#
“Before you pass this aside, Windows 10 can also be configured as a web server, so it is impacted as well. “That makes this bug wormable, with even Microsoft calling that out in their write-up,” said Dustin Childs, with Trend Micro’s ZDI program. With this weakness, an attacker could compromise a host simply by sending it a specially-crafted packet of data.
#OUTLOOK FOR MAC UPGRADES CODE#
By all accounts, the most pressing priority this month is CVE-2021-31166, a Windows 10 and Windows Server flaw which allows an unauthenticated attacker to remotely execute malicious code at the operating system level. While May brings about half the normal volume of updates from Microsoft, there are some notable weaknesses that deserve prompt attention, particularly from enterprises. On deck this month are patches to quash a wormable flaw, a creepy wireless bug, and yet another reason to call for the death of Microsoft’s Internet Explorer (IE) web browser. Four of these weaknesses can be exploited by malware and malcontents to seize complete, remote control over vulnerable systems without any help from users. Microsoft today released fixes to plug at least 55 security holes in its Windows operating systems and other software.
