Do not have time to read full article and want this article in PDF format in your email.Enter your Email Address
Microsoft has released a large batch of security updates to patch a total of 81 CVE-listed vulnerabilities, on all supported versions of Windows and other MS products, as part of its September Patch Tuesday
The latest security update addresses 27 critical and 54 important vulnerabilities in severity, of which 38 vulnerabilities are impacting Windows, 39 could lead to Remote Code Execution (RCE).
Affected Microsoft products include:
- Internet Explorer
- Microsoft Edge
- Microsoft Windows
- .NET Framework
- Skype for Business and Lync
- Microsoft Exchange Server
- Microsoft Office, Services, and Web Apps
- Adobe Flash Player Patch 1, Patch 2 & Patch 3
.NET Zero-Day Flaw Under Active Attack
According to Microsoft, four of the patched vulnerabilities are publicly known, one of which has already been actively exploited by the attackers in the wild.
Here’s the list of publically known flaws and their impact:
Windows .NET Framework RCE (CVE-2017-8759)—
This flaw could allow an attacker to take control of an affected system, install programs, view, change, or delete data by tricking victims into opening a specially crafted document or application sent over an email. The flaw could even allow an attacker to create new accounts with full user rights. Therefore users with fewer user rights on the system are less impacted than users who operate with admin rights.
The remaining three publicly known vulnerabilities affecting the Windows 10 platform include:
- Device Guard Security Feature Bypass Vulnerability (CVE-2017-8746): This flaw could allow an attacker to inject malicious code into a Windows PowerShell session by bypassing the Device Guard Code Integrity policy.
- Microsoft Edge Security Feature Bypass Vulnerability (CVE-2017-8723): This flaw resides in Edge where the Content Security Policy (CSP) fails to properly validate certain specially crafted documents, allowing attackers to trick users into visiting a website hosting malware.
- Broadcom BCM43xx Remote Code Execution Vulnerability (CVE-2017-9417): This flaw exists in the Broadcom chipset in HoloLens, which could be exploited by attackers to send a specially crafted WiFi packet, enabling them to install programs, view, change, or delete data, even create new accounts with full admin rights.
Another Reason to Install Patches Immediately is BlueBorne Attack
Security researchers have discovered eight vulnerabilities — codenamed collectively as BlueBorne — in the Bluetooth implementations used by over 5.3 billion devices.
Researchers say the vulnerabilities are undetectable and unstoppable by traditional security solutions. No user interaction is needed for an attacker to use the BlueBorne flaws, nor does the attacker need to pair with a target device.
BlueBorne affects all Bluetooth enabled devices
They affect the Bluetooth implementations in Android, iOS, Microsoft, and Linux, impacting almost all Bluetooth device types, from smartphones to laptops, and from IoT devices to smart cars.
Three of these eight security flaws are rated critical and according to researchers at Armis — the IoT security company that discovered BlueBorne — they allow attackers to take over devices and execute malicious code, or to run Man-in-the-Middle attacks and intercept Bluetooth communications.
Furthermore, the vulnerabilities can be concocted into a self-spreading BlueTooth worm that could wreak havoc inside a company’s network or even across the world.
So, users have another important reason to apply September security patches as soon as possible in order to keep hackers and cybercriminals away from taking control over their computers.
Other flaws patched this month include five information disclosure and one denial of service flaws in Windows Hyper-V, two cross-site scripting (XSS) flaws in SharePoint, as well as four memory corruption and two remote code execution vulnerabilities in MS Office.
For installing security updates, simply head on to Settings → Update & security → Windows Update → Check for updates, or you can install the updates manually.