Microsoft released October security updates

Microsoft has released planned security updates to close 81 vulnerabilities, 3 of which have been classified as critical. Among the other 3 vulnerabilities were publicly disclosed (0-day), and the exploitation of one vulnerability was recorded in real attacks. The highest CVSS rating among all closed vulnerabilities was 9.0 out of 10. In this article I will talk about the most important moments of the October Tuesday updates.

Remember, almost 90% of all vulnerabilities already had patches from the manufacturers at the time of their release, so it is so important not only to update your software, but also to do it in a timely manner (according to Flexera’s Vulnerability Review Report).

A summary of the number and type of vulnerabilities closed in October is shown in the graph.

Patch Tuesday: Microsoft has released October security updates
Patch Tuesday: Microsoft has released October security updates

The following vulnerabilities and security updates should be particularly noted

CVE-2021-36970Windows Print Spooler Spoofing Vulnerability (Important, CVSS Score 8.8)
According to the Microsoft Exploitation Index, the likelihood of attacks using this vulnerability is high.
It should be noted that after the installation of the August security update, the default behavior of the “Point and Print” function has changed – now only administrative accounts can install and update printer drivers. Details can be found in our blog

CVE-2021-41340Windows Graphics Component Remote Code Execution Vulnerability (Important, CVSS Score 7.8)

CVE-2021-40461Windows Hyper-V Remote Code Execution Vulnerability (Critical, CVSS Score 8.0)
The vulnerability affects Windows 10 and Windows Server 2019 versions 1909, 2004, 20H2, 21H1, and Windows 11 and Windows Server 2022.

CVE-2021-38672Windows Hyper-V Remote Code Execution Vulnerability (Critical, CVSS Score 8.0)
Only Windows 11 and Windows Server 2022 are affected by this vulnerability.

CVE-2021-40486Microsoft Word Remote Code Execution Vulnerability (Critical, CVSS Score 7.8)
This vulnerability can be exploited through the preview panel.

CVE-2021-40485Microsoft Excel Remote Code Execution Vulnerability (Important, CVSS Score 7.8)
This vulnerability cannot be exploited through the preview panel.

CVE-2021-40480Microsoft Visio Remote Code Execution Vulnerability (Important, CVSS Score 7.8)
This vulnerability cannot be exploited through the preview panel.

CVE-2021-40487Microsoft SharePoint Server Remote Code Execution Vulnerability (Important, CVSS Score 8.1)
According to the Microsoft Exploitation Index, the likelihood of attacks using this vulnerability is high.

Information about the following vulnerabilities was made public:

CVE-2021-40469Windows DNS Server Remote Code Execution Vulnerability (Important, CVSS Score 7.2)

The exploitation of the next vulnerability was recorded in real attacks:

CVE-2021-40449Win32k Elevation of Privilege Vulnerability (Important, CVSS Score 7.8)

Servicing stack updates

Great news for administrators – OS servicing stack updates no longer need to be installed separately! Servicing Stack Updates (SSU) for Windows 10 and Windows Server 2019 versions 1809, 1909, 2004, 20H1, 20H2, 21H1 are now integrated into a single cumulative update package. All details on SSU updates you can look on our portal.

As always, you can find the most complete and up-to-date information on vulnerabilities and security updates on our portal Security Update Guide… For a complete list of KB articles for the respective service packs that have potential installation issues, see release notes

you also can look recording our monthly webinar Microsoft Security Updates Briefing for a more detailed breakdown of this release of updates and the most important vulnerabilities.


Artyom Sinitsyn CISSP, CCSP, MCSE, Certified Azure Security Engineer
Senior Leader of Information Security Programs in Central and Eastern Europe
Microsoft

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *