Microsoft Issues Patches for Defender Zero-Day, 82 Other Windows Flaws

e4cf851f05262c89b5169c8bceab261f?s=196&r=pg
Majority Owner of The AEGIS Alliance. I studied in college for Media Arts, Game Development. Talents include Writer/Article Writer, Graphic Design, Photoshop, Web Design and Development, Video Production, Social Media, and eCommerce.

(The AEGIS Alliance) – For the main patch released on January 12, Tuesday of 2021, Microsoft launched security updates addressing 83 flaws in total across as many as 11 services and products, together with an actively exploited zero-day vulnerability.

The new security patches are for Microsoft Windows, Edge browser, ChakraCore, Office and Microsoft Office Services, and Web Apps, Visual Studio, Microsoft Malware Protection Engine, .NET Core, ASP .NET, and Azure. Of these 83 bugs, 10 made the Critical list, and 73 are labeled as Important in priority.

The most critical of the issues is a remote code execution (RCE) flaw in Microsoft Defender (CVE-2021-1647) that was able to enable cyber attackers to infect targeted systems with arbitrary code.

Microsoft Malware Protection Engine (mpengine.dll) gives the scanning, detection, and cleansing capabilities for the Microsoft Defender antivirus and antispyware software. The final version of Defender affected by the flaw is 1.1.17600.5 before it had been addressed in version 1.1.17700.4.

The bug has also been identified to have been actively exploited within the wild of the interwebs, though specifics are scarce on how widespread the cyber assaults are or how it was being exploited. In addition, a zero-click flaw in that the vulnerable system may be exploited with no interaction from a Windows user.

Microsoft mentioned that regardless of active exploitation, the approach shouldn’t be functional for all conditions and that the exploit continues to be thought to be at a proof-of-concept degree, with substantial modifications required for it to succeed.

Also, the flaw may have already been resolved as a part of automated updates to the Malware Protection Engine, which it normally releases once each month or when required to safeguard against recently found threats — unless the systems aren’t actively connected to the internet.

“For organizations that are configured for automatic updating, no actions should be required, but one of the first actions a threat actor or malware will try to attempt is to disrupt threat protection on a system so definition and engine updates are blocked,” Chris Goettl stated, senior director of product management and security at Ivanti.

Additionally, Tuesday’s patch resolves a privilege escalation flaw (CVE-2021-1648) released in an earlier patch with the GDI Print / Print Spooler API (“splwow64.exe”) that was disclosed by Google Project Zero in December 2020 after Microsoft did not resolve it inside 90 days of responsible disclosure on September 24.

Other included vulnerability fixes released by Microsoft are for memory corruption flaws in Microsoft Edge browser (CVE-2021-1705), a feature for a Windows Remote Desktop Protocol Core Security bypass flaw (CVE-2021-1674, CVSS rating 8.8), and five crucial RCE flaws in Remote Procedure Call Runtime.

To install the most recent security updates, Windows users can go over to Start > Settings > Update & Security > Windows Update, or by choosing to check for Windows updates.

Kyle James Lee – The AEGIS Alliance – This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

e4cf851f05262c89b5169c8bceab261f?s=96&r=pg
Kyle James Leehttp://theaegisalliance.com
Majority Owner of The AEGIS Alliance. I studied in college for Media Arts, Game Development. Talents include Writer/Article Writer, Graphic Design, Photoshop, Web Design and Development, Video Production, Social Media, and eCommerce.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Please consider giving us a monetary contribution toward important projects and to continue operating via Crypto. We also accept PayPal and Checks by mail.

  • bitcoin Bitcoin
  • ethereum Ethereum
  • bitcoin cash Bitcoin cash
  • litecoin Litecoin
  • dash Dash
  • eos Eos
  • ethereum classic Ethereum classic
  • zcash Zcash
Scan to Donate Bitcoin to 35fJFcE1xQPwt1KujXUrmKn9J8WEnm9BbM

Contribute Bitcoin to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin

Scan to Donate Ethereum to 0x2764fe441CB5EBd9919eDAD4b2Bf70Dc2dC399Da

Contribute Ethereum to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum

Scan to Donate Bitcoin cash to qr9j84dx9736ultjr7ty2dcr5rl27z5m2vx0hjqw57

Contribute Bitcoin cash to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin cash

Scan to Donate Litecoin to MKVu1osxKsRSBc7U2NdgdYnyjMPanMUxx9

Contribute Litecoin to this address

Scan the QR code or copy the address below into your wallet to send some Litecoin

Scan to Donate Dash to XuHFuU7mpyRAm8WbtUK54Ws7bVTcQgK8vd

Contribute Dash to this address

Scan the QR code or copy the address below into your wallet to send some Dash

Scan to Donate Eos to coinbasebase (944543472)

Contribute Eos to this address

Scan the QR code or copy the address below into your wallet to send some Eos

Scan to Donate Ethereum classic to 0x19D64fb43a316d8A87230e596746D87a8345075B

Contribute Ethereum classic to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum classic

Scan to Donate Zcash to t1Ud7hP7J9FsopMSZU5vShe68PWos2Fha3D

Contribute Zcash to this address

Scan the QR code or copy the address below into your wallet to send some Zcash

Subscribe to Our Newsletter

*

indicates required

/ ( mm / dd )

We Accept Monetary Contributions Toward Our Important Projects

Subscribe to Our Newsletter

*

indicates required

/ ( mm / dd )

Related Articles