September 2021 - Microsoft Releases Security Patches
Publish date: November 12, 2021
Advisory Date: SEP 14, 2021
DESCRIPTION
In the November 2020 Microsoft security patch release, Microsoft updated its vulnerability information page. Following the new patch information format, below are the CVEs that Trend Micro Cloud One Workload covers in the September 2021 release:
- CVE-2021-26435 - Windows Scripting Engine Memory Corruption Vulnerability
CVSS:3.0 8.1/7.1
- CVE-2021-36965 - Windows WLAN AutoConfig Service Remote Code Execution Vulnerability
CVSS:3.0 8.8/7.7
- CVE-2021-38647 - Open Management Infrastructure Remote Code Execution Vulnerability
CVSS:3.0 9.8/8.5
TREND MICRO PROTECTION INFORMATION
The aforementioned vulnerabilities are addressed by Trend Micro Deep Security and Trend Micro Cloud One Workload Security rules issued in past releases.
Featured Stories
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more
- Abusing Argo CD, Helm, and Artifact Hub: An Analysis of Supply Chain Attacks in Cloud-Native ApplicationsWe provide an overview of cloud-native tools and examine how cybercriminals can exploit their vulnerabilities to launch supply chain attacks.Read more
- Trends and Shifts in the Underground N-Day Exploit MarketOur two-year research provides insights into the life cycle of exploits, the types of exploit buyers and sellers, and the business models that are reshaping the underground exploit market.Read more