Security
Headlines
HeadlinesLatestCVEs

Tag

#microsoft

Not Punny: Angling Direct Breach Cripples Retailer for Days

A U.K. fishing retailer’s site has been hijacked and redirected to Pornhub.

Threatpost
#Malware#Vulnerabilities#Web Security#microsoft#Breach#Hacks#Web Security
Why Self-Learning AI Is Changing the Paradigm of ICS Security

By focusing on the organization rather than the threat, AI can identify subtle changes in your digital environment that point to a cyber threat.

Microsoft Patch Tuesday for Nov. 2021 — Snort rules and prominent vulnerabilities

By Jon Munshaw and Tiago Pereira.  Microsoft released its monthly security update Tuesday, disclosing 56 vulnerabilities in the company’s various software, hardware and firmware offerings, including one that’s actively being exploited in the wild.   November’s security update... [[ This is only the beginning! Please visit the blog for the complete entry ]]

Cisco Talos finds 10 vulnerabilities in Azure Sphere’s Linux kernel, Security Monitor and Pluton

By Claudio Bozzato and Lilith [-_-];. Following our previous engagements (see blog posts 1, 2, 3 and 4) with Microsoft's Azure Sphere IoT platform, we decided to take another look at the device, without all the rush and commotion that normally entails a hacking challenge.  Today, we’re... [[ This is only the beginning! Please visit the blog for the complete entry ]]

CVE-2021-42298: Microsoft Defender Remote Code Execution Vulnerability

References Identification First version of the Microsoft Malware Protection Engine with this vulnerability addressed Version 1.1.18700.3 See Manage Updates Baselines Microsoft Defender Antivirus for more information. *Microsoft Defender is disabled in my environment, why are vulnerability scanners showing that I am vulnerable to this issue?* Vulnerability scanners are looking for specific binaries and version numbers on devices. Microsoft Defender files are still on disk even when disabled. Systems that have disabled Microsoft Defender are not in an exploitable state. *Why is no action required to install this update?* In response to a constantly changing threat landscape, Microsoft frequently updates malware definitions and the Microsoft Malware Protection Engine. In order to be effective in helping protect against new and prevalent threats, antimalware software must be kept up to date with these updates in a timely manner. For enterprise deployments as well as end users, the de...

CVE-2021-26443: Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability

*How Could an Attacker Exploit this Vulnerability?* A remote code execution vulnerability exists when a VM guest fails to properly handle communication on a VMBus channel. To exploit the vulnerability, an authenticated attacker could send a specially crafted communication on the VMBus channel from the guest VM to the Host. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.

CVE-2021-3711: OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow

*Why is this OpenSSL Software Foundation CVE included in the Security Update Guide?* The vulnerability assigned to this CVE is in OpenSSL Software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

CVE-2021-42316: Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability

**What is the attack vector for this vulnerability?** An attacker can write to any file where the webserver user (nt authority\\network service) has write access.

CVE-2021-42275: Microsoft COM for Windows Remote Code Execution Vulnerability

*How could an attacker exploit this vulnerability?* An authorized attacker could exploit this Windows COM vulnerability by sending from a user mode application specially crafted malicious COM traffic directed at the COM Server, which might lead to remote code execution.

CVE-2021-42321: Microsoft Exchange Server Remote Code Execution Vulnerability

*What can cause this vulnerability?* The vulnerability occurs due to improper validation of cmdlet arguments. *Does the attacker need to be in an authenticated role in the Exchange Server?* Yes, the attacker must be authenticated.