fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Microsoft July 2021 Patch Tuesday fixes 9 zero-days, 117 flaws

Microsoft July 2021 Patch Tuesday fixes 9 zero-days, 117 flaws

Today is Microsoft’s July 2021 Patch Tuesday, and with it comes fixes for nine zero-day vulnerabilities and a total of 117 flaws, so Windows admins will be pulling their hair out as they scramble to get devices patched and secured.

Microsoft has fixed 117 vulnerabilities with today’s update, with 13 classified as Critical, 1 Moderate, and 103 as Important.

Of the 117 vulnerabilities, 44 are remote code execution, 32 are for elevation of privilege, 14 are information disclosure, 12 are Denial of Service, 8 are security feature bypass, and seven are spoofing vulnerabilities.

For information about the non-security Windows updates, you can read about today’s Windows 10 KB5004237 & KB5004245 cumulative updates.

Also Read: Personal Data Protection Act Singapore: Is Your Business Compliant?

Nine zero-days fixed, with four actively exploited

July’s Patch Tuesday includes nine zero-day vulnerabilities, with four actively exploited in the wild.

Microsoft classifies a zero-day vulnerability as publicly disclosed or actively exploited with no official security updates or released.

The five publicly disclosed, but not exploited, zero-day vulnerabilities are:

  • CVE-2021-34492 – Windows Certificate Spoofing Vulnerability
  • CVE-2021-34523 – Microsoft Exchange Server Elevation of Privilege Vulnerability
  • CVE-2021-34473 – Microsoft Exchange Server Remote Code Execution Vulnerability
  • CVE-2021-33779 – Windows ADFS Security Feature Bypass Vulnerability
  • CVE-2021-33781 – Active Directory Security Feature Bypass Vulnerability

There was one publicly disclosed and actively exploited vulnerability known as PrintNightmare.

  • CVE-2021-34527 – Windows Print Spooler Remote Code Execution Vulnerability

Finally, there are three actively exploited Windows vulnerabilities that were not publicly disclosed.

  • CVE-2021-33771 – Windows Kernel Elevation of Privilege Vulnerability
  • CVE-2021-34448 – Scripting Engine Memory Corruption Vulnerability
  • CVE-2021-31979 – Windows Kernel Elevation of Privilege Vulnerability

The print nightmare

Last month, a proof-of-concept exploit was released by accident for the zero-day PrintNightmare vulnerability that allows remote code execution and local privilege escalation.

Due to the severity of the attacks, Microsoft released an out-of-band KB5004945 security update that was supposed to fix the PrintNightmare vulnerability tracked as CVE-2021-34527.

Microsoft’s OOB patch only resolves the vulnerability if the Point and Print policy is disabled. The patch can be bypassed for those devices that still have this registry setting enabled to achieve remote code execution and local privilege escalation.

However, Microsoft states that the patches are working as intended and that Windows admins should install the patches immediately as the vulnerabilities are being actively exploited.

“Our investigation has shown that the OOB security update is working as designed and is effective against the known printer spooling exploits and other public reports collectively being referred to as PrintNightmare,” the Microsoft Security Response Center explains.

“All reports we have investigated have relied on the changing of default registry setting related to Point and Print to an insecure configuration.”

Security research and Mimikatz creator feels that the patch still needs improvement to protect against the bypasses he and others have foundhttps://platform.twitter.com/embed/Tweet.html?creatorScreenName=BleepinComputer&dnt=false&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3R3ZWV0X2VtYmVkX2NsaWNrYWJpbGl0eV8xMjEwMiI6eyJidWNrZXQiOiJjb250cm9sIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1413420341658066944&lang=en&origin=https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fmicrosoft%2Fmicrosoft-july-2021-patch-tuesday-fixes-9-zero-days-117-flaws%2F&sessionId=53b84b2a235179287d08ca91642d35d9b11a6f5d&siteScreenName=BleepinComputer&theme=light&widgetsVersion=82e1070%3A1619632193066&width=550px

Recent updates from other companies

Other vendors who released updates in July include:

The July 2021 Patch Tuesday Security Updates

Below is the full list of resolved vulnerabilities and released advisories in the July 2021 Patch Tuesday updates. To access the full description of each vulnerability and the systems that it affects, you can view the full report here.

TagCVE IDCVE TitleSeverity
Active Directory Federation ServicesCVE-2021-33779Windows ADFS Security Feature Bypass VulnerabilityImportant
Common Internet File SystemCVE-2021-34476Bowser.sys Denial of Service VulnerabilityImportant
Dynamics Business Central ControlCVE-2021-34474Dynamics Business Central Remote Code Execution VulnerabilityCritical
Microsoft BingCVE-2021-33753Microsoft Bing Search Spoofing VulnerabilityImportant
Microsoft Exchange ServerCVE-2021-31206Microsoft Exchange Server Remote Code Execution VulnerabilityImportant
Microsoft Exchange ServerCVE-2021-34473Microsoft Exchange Server Remote Code Execution VulnerabilityCritical
Microsoft Exchange ServerCVE-2021-33766Microsoft Exchange Information Disclosure VulnerabilityImportant
Microsoft Exchange ServerCVE-2021-34523Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
Microsoft Exchange ServerCVE-2021-31196Microsoft Exchange Server Remote Code Execution VulnerabilityImportant
Microsoft Exchange ServerCVE-2021-33768Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
Microsoft Exchange ServerCVE-2021-34470Microsoft Exchange Server Elevation of Privilege VulnerabilityImportant
Microsoft Graphics ComponentCVE-2021-34440GDI+ Information Disclosure VulnerabilityImportant
Microsoft Graphics ComponentCVE-2021-34489DirectWrite Remote Code Execution VulnerabilityImportant
Microsoft Graphics ComponentCVE-2021-34496Windows GDI Information Disclosure VulnerabilityImportant
Microsoft Graphics ComponentCVE-2021-34498Windows GDI Elevation of Privilege VulnerabilityImportant
Microsoft Graphics ComponentCVE-2021-34438Windows Font Driver Host Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2021-34469Microsoft Office Security Feature Bypass VulnerabilityImportant
Microsoft OfficeCVE-2021-34451Microsoft Office Online Server Spoofing VulnerabilityImportant
Microsoft OfficeCVE-2021-34452Microsoft Word Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2021-34501Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2021-34518Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2021-34468Microsoft SharePoint Server Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2021-34519Microsoft SharePoint Server Information Disclosure VulnerabilityModerate
Microsoft Office SharePointCVE-2021-34520Microsoft SharePoint Server Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2021-34517Microsoft SharePoint Server Spoofing VulnerabilityImportant
Microsoft Office SharePointCVE-2021-34467Microsoft SharePoint Server Remote Code Execution VulnerabilityImportant
Microsoft Scripting EngineCVE-2021-34448Scripting Engine Memory Corruption VulnerabilityCritical
Microsoft Windows Codecs LibraryCVE-2021-33778HEVC Video Extensions Remote Code Execution VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2021-31947HEVC Video Extensions Remote Code Execution VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2021-33740Windows Media Remote Code Execution VulnerabilityCritical
Microsoft Windows Codecs LibraryCVE-2021-33760Media Foundation Information Disclosure VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2021-33775HEVC Video Extensions Remote Code Execution VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2021-33776HEVC Video Extensions Remote Code Execution VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2021-33777HEVC Video Extensions Remote Code Execution VulnerabilityImportant
Microsoft Windows Codecs LibraryCVE-2021-34521Raw Image Extension Remote Code Execution VulnerabilityImportant
Microsoft Windows DNSCVE-2021-34499Windows DNS Server Denial of Service VulnerabilityImportant
Microsoft Windows DNSCVE-2021-33746Windows DNS Server Remote Code Execution VulnerabilityImportant
Microsoft Windows DNSCVE-2021-33754Windows DNS Server Remote Code Execution VulnerabilityImportant
Microsoft Windows Media FoundationCVE-2021-34441Microsoft Windows Media Foundation Remote Code Execution VulnerabilityImportant
Microsoft Windows Media FoundationCVE-2021-34439Microsoft Windows Media Foundation Remote Code Execution VulnerabilityCritical
Microsoft Windows Media FoundationCVE-2021-34503Microsoft Windows Media Foundation Remote Code Execution VulnerabilityCritical
OpenEnclaveCVE-2021-33767Open Enclave SDK Elevation of Privilege VulnerabilityImportant
Power BICVE-2021-31984Power BI Remote Code Execution VulnerabilityImportant
Role: DNS ServerCVE-2021-33749Windows DNS Snap-in Remote Code Execution VulnerabilityImportant
Role: DNS ServerCVE-2021-33745Windows DNS Server Denial of Service VulnerabilityImportant
Role: DNS ServerCVE-2021-34442Windows DNS Server Denial of Service VulnerabilityImportant
Role: DNS ServerCVE-2021-34444Windows DNS Server Denial of Service VulnerabilityImportant
Role: DNS ServerCVE-2021-34525Windows DNS Server Remote Code Execution VulnerabilityImportant
Role: DNS ServerCVE-2021-33780Windows DNS Server Remote Code Execution VulnerabilityImportant
Role: DNS ServerCVE-2021-34494Windows DNS Server Remote Code Execution VulnerabilityCritical
Role: DNS ServerCVE-2021-33750Windows DNS Snap-in Remote Code Execution VulnerabilityImportant
Role: DNS ServerCVE-2021-33752Windows DNS Snap-in Remote Code Execution VulnerabilityImportant
Role: DNS ServerCVE-2021-33756Windows DNS Snap-in Remote Code Execution VulnerabilityImportant
Role: Hyper-VCVE-2021-33758Windows Hyper-V Denial of Service VulnerabilityImportant
Role: Hyper-VCVE-2021-33755Windows Hyper-V Denial of Service VulnerabilityImportant
Role: Hyper-VCVE-2021-34450Windows Hyper-V Remote Code Execution VulnerabilityCritical
Visual Studio CodeCVE-2021-34529Visual Studio Code Remote Code Execution VulnerabilityImportant
Visual Studio CodeCVE-2021-34528Visual Studio Code Remote Code Execution VulnerabilityImportant
Visual Studio CodeCVE-2021-34479Microsoft Visual Studio Spoofing VulnerabilityImportant
Visual Studio Code – .NET RuntimeCVE-2021-34477Visual Studio Code .NET Runtime Elevation of Privilege VulnerabilityImportant
Windows Active DirectoryCVE-2021-33781Active Directory Security Feature Bypass VulnerabilityImportant
Windows Address BookCVE-2021-34504Windows Address Book Remote Code Execution VulnerabilityImportant
Windows AF_UNIX Socket ProviderCVE-2021-33785Windows AF_UNIX Socket Provider Denial of Service VulnerabilityImportant
Windows AppContainerCVE-2021-34459Windows AppContainer Elevation Of Privilege VulnerabilityImportant
Windows AppX Deployment ExtensionsCVE-2021-34462Windows AppX Deployment Extensions Elevation of Privilege VulnerabilityImportant
Windows AuthenticodeCVE-2021-33782Windows Authenticode Spoofing VulnerabilityImportant
Windows Cloud Files Mini Filter DriverCVE-2021-33784Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportant
Windows Console DriverCVE-2021-34488Windows Console Driver Elevation of Privilege VulnerabilityImportant
Windows DefenderCVE-2021-34522Microsoft Defender Remote Code Execution VulnerabilityCritical
Windows DefenderCVE-2021-34464Microsoft Defender Remote Code Execution VulnerabilityCritical
Windows Desktop BridgeCVE-2021-33759Windows Desktop Bridge Elevation of Privilege VulnerabilityImportant
Windows Event TracingCVE-2021-33774Windows Event Tracing Elevation of Privilege VulnerabilityImportant
Windows File History ServiceCVE-2021-34455Windows File History Service Elevation of Privilege VulnerabilityImportant
Windows HelloCVE-2021-34466Windows Hello Security Feature Bypass VulnerabilityImportant
Windows HTML PlatformCVE-2021-34446Windows HTML Platforms Security Feature Bypass VulnerabilityImportant
Windows InstallerCVE-2021-33765Windows Installer Spoofing VulnerabilityImportant
Windows InstallerCVE-2021-34511Windows Installer Elevation of Privilege VulnerabilityImportant
Windows InstallerCVE-2021-31961Windows InstallService Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2021-34461Windows Container Isolation FS Filter Driver Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2021-34508Windows Kernel Remote Code Execution VulnerabilityImportant
Windows KernelCVE-2021-34458Windows Kernel Remote Code Execution VulnerabilityCritical
Windows KernelCVE-2021-33771Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2021-31979Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2021-34514Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows KernelCVE-2021-34500Windows Kernel Memory Information Disclosure VulnerabilityImportant
Windows Key Distribution CenterCVE-2021-33764Windows Key Distribution Center Information Disclosure VulnerabilityImportant
Windows Local Security Authority Subsystem ServiceCVE-2021-33788Windows LSA Denial of Service VulnerabilityImportant
Windows Local Security Authority Subsystem ServiceCVE-2021-33786Windows LSA Security Feature Bypass VulnerabilityImportant
Windows MSHTML PlatformCVE-2021-34497Windows MSHTML Platform Remote Code Execution VulnerabilityCritical
Windows MSHTML PlatformCVE-2021-34447Windows MSHTML Platform Remote Code Execution VulnerabilityImportant
Windows Partition Management DriverCVE-2021-34493Windows Partition Management Driver Elevation of Privilege VulnerabilityImportant
Windows PFX EncryptionCVE-2021-34492Windows Certificate Spoofing VulnerabilityImportant
Windows Print Spooler ComponentsCVE-2021-34527Windows Print Spooler Remote Code Execution VulnerabilityCritical
Windows Projected File SystemCVE-2021-33743Windows Projected File System Elevation of Privilege VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2021-34457Windows Remote Access Connection Manager Information Disclosure VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2021-33761Windows Remote Access Connection Manager Elevation of Privilege VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2021-33773Windows Remote Access Connection Manager Elevation of Privilege VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2021-33763Windows Remote Access Connection Manager Information Disclosure VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2021-34445Windows Remote Access Connection Manager Elevation of Privilege VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2021-34456Windows Remote Access Connection Manager Elevation of Privilege VulnerabilityImportant
Windows Remote AssistanceCVE-2021-34507Windows Remote Assistance Information Disclosure VulnerabilityImportant
Windows Secure Kernel ModeCVE-2021-33744Windows Secure Kernel Mode Security Feature Bypass VulnerabilityImportant
Windows Security Account ManagerCVE-2021-33757Windows Security Account Manager Remote Protocol Security Feature Bypass VulnerabilityImportant
Windows ShellCVE-2021-34454Windows Remote Access Connection Manager Information Disclosure VulnerabilityImportant
Windows SMBCVE-2021-33783Windows SMB Information Disclosure VulnerabilityImportant
Windows Storage Spaces ControllerCVE-2021-33751Storage Spaces Controller Elevation of Privilege VulnerabilityImportant
Windows Storage Spaces ControllerCVE-2021-34460Storage Spaces Controller Elevation of Privilege VulnerabilityImportant
Windows Storage Spaces ControllerCVE-2021-34509Storage Spaces Controller Information Disclosure VulnerabilityImportant
Windows Storage Spaces ControllerCVE-2021-34510Storage Spaces Controller Elevation of Privilege VulnerabilityImportant
Windows Storage Spaces ControllerCVE-2021-34512Storage Spaces Controller Elevation of Privilege VulnerabilityImportant
Windows Storage Spaces ControllerCVE-2021-34513Storage Spaces Controller Elevation of Privilege VulnerabilityImportant
Windows TCP/IPCVE-2021-31183Windows TCP/IP Driver Denial of Service VulnerabilityImportant
Windows TCP/IPCVE-2021-33772Windows TCP/IP Driver Denial of Service VulnerabilityImportant
Windows TCP/IPCVE-2021-34490Windows TCP/IP Driver Denial of Service VulnerabilityImportant
Windows Win32KCVE-2021-34449Win32k Elevation of Privilege VulnerabilityImportant
Windows Win32KCVE-2021-34516Win32k Elevation of Privilege VulnerabilityImportant
Windows Win32KCVE-2021-34491Win32k Information Disclosure VulnerabilityImportant

Also Read: How to Choose a Penetration Testing Vendor

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us