Latest Security Advisories & Notable Vulnerabilities

June 2021 - Microsoft Releases Security Patches
 Advisory Date:  08 Jun 2021

In the November 2020 Microsoft security patch release, Microsoft updated its vulnerability information page. Following the new patch information format, below is the CVE that Trend Micro Cloud One Workload covers in the June 2021 release:

  • CVE-2021-31959 - Scripting Engine Memory Corruption Vulnerability
    CVSS:3.0 6.4/5.6

May 2021 - Microsoft Releases Security Patches
 Advisory Date:  11 May 2021

In the November 2020 Microsoft security patch release, Microsoft updated its vulnerability information page. Following the new patch information format, below are the CVEs that Trend Micro Cloud One Workload covers in the May 2021 release:

  • CVE-2021-26419 - Scripting Engine Memory Corruption Vulnerability
    CVSS:3.0 7.5/6.7

  • CVE-2021-31181 - Microsoft SharePoint Remote Code Execution Vulnerability
    CVSS:3.0 8.8/7.7

  • CVE-2021-31166 - HTTP Protocol Stack Remote Code Execution Vulnerability
    CVSS:3.0 9.8/8.5

April 2021 - Microsoft Releases Security Patches
 Advisory Date:  14 Apr 2021

In the November 2020 Microsoft security patch release, Microsoft updated its vulnerability information page. Following the new patch information format, below are the CVEs that Trend Micro Cloud One Workload and Vulnerability Protection cover in the April 2021 release:

  • CVE-2021-28310 - Win32k Elevation of Privilege Vulnerability
    CVSS:3.0 7.8/7.2

  • CVE-2021-28325 - Windows SMB Information Disclosure Vulnerability
    CVSS:3.0 6.5/5.7

March 2021 - Microsoft Releases Security Patches
 Advisory Date:  10 Mar 2021

In the November 2020 Microsoft security patch release, Microsoft updated its vulnerability information page. This update is of critical importance as it directly addresses the vulnerabilities that have been exploited by a threat actor group known as Hafnium. Microsoft acknowledged there are attacks based on these vulnerabilities.

Following the new patch information format, below are the CVEs that Trend Micro Cloud One Workload covers in the March 2021 release:

  • CVE-2021-26855 - Microsoft Exchange Server Remote Code Execution Vulnerability
    CVSS:3.0 9.1/8.4

  • CVE-2021-26411 - Internet Explorer Memory Corruption Vulnerability
    CVSS:3.0 8.8/7.9

  • CVE-2021-26877 - Windows DNS Server Remote Code Execution Vulnerability
    CVSS:3.0 9.8/8.5

  • CVE-2021-26897 - Windows DNS Server Remote Code Execution Vulnerability
    CVSS:3.0 9.8/8.5

  • CVE-2021-27076 - Windows DNS Server Remote Code Execution Vulnerability
    CVSS:3.0 8.8/7.7

In the November 2020 Microsoft security patch release, Microsoft updated its vulnerability information page. Following the new patch information format, below are the CVEs that Trend Micro Deep Security covers in the February 2021 release:

  • CVE-2021-24078 - Windows DNS Server Remote Code Execution Vulnerability
    CVSS:3.0 9.8/8.5

  • CVE-2021-24072 - Microsoft SharePoint Server Remote Code Execution Vulnerability
    CVSS:3.0 8.8/7.7

In the November 2020 Microsoft security patch release, Microsoft updated its vulnerability information page. Following the new patch information format, below are the CVEs that Trend Micro Deep Security covers in the January 2021 release:

  • CVE-2021-1713 - Microsoft Excel Remote Code Execution Vulnerability
    CVSS:3.0 7.8/6.8

  • CVE-2021-1707 - Microsoft SharePoint Server Remote Code Execution Vulnerability
    CVSS:3.0 8.8/7.7

  • CVE-2021-1647 - Microsoft Defender Remote Code Execution Vulnerability
    CVSS:3.0 7.8/7.0

  • CVE-2021-1715 - Microsoft Word Remote Code Execution Vulnerability
    CVSS:3.0 7.8/6.8

In the December 2020 Microsoft security patch release, Microsoft updated its vulnerability information page. Following the new patch information format, below are the CVEs that Trend Micro Deep Security covers:

  • CVE-2020-17140 - Windows SMB Information Disclosure Vulnerability
    CVSS:3.0 8.1/7.1

  • CVE-2020-17096 - Scripting Engine Memory Corruption Vulnerability
    CVSS:3.0 7.5/6.5

  • CVE-2020-17121 - Microsoft SharePoint Remote Code Execution Vulnerability
    CVSS:3.0 8.8/7.7

  • CVE-2020-17144 - Microsoft Exchange Remote Code Execution Vulnerability
    CVSS:3.0 8.4/7.6

  • CVE-2020-17152 - Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability
    CVSS:3.0 8.8/7.7

  • CVE-2020-17158 - Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability
    CVSS:3.0 8.8/7.7

In the November 2020 Microsoft security patch release, Microsoft updated its vulnerability information page. Following the new patch information format, below are the CVEs that Trend Micro Deep Security covers:

  • CVE-2020-17087 - Windows Kernel Local Elevation of Privilege Vulnerability
    CVSS:3.0 7.8/7.2

  • CVE-2020-17052 - Scripting Engine Memory Corruption Vulnerability
    CVSS:3.0 7.5/6.7

  • CVE-2020-17053 - Internet Explorer Memory Corruption Vulnerability
    CVSS:3.0 7.5/6.7

  • CVE-2020-17051 - Windows Network File System Remote Code Execution Vulnerability
    CVSS:3.0 9.8/8.5

  • CVE-2020-17056 - Windows Network File System Remote Code Execution Vulnerability
    CVSS:3.0 5.5/4.8

Microsoft addresses several vulnerabilities in its October security bulletin. Trend Micro Deep Security covers the following:

  • CVE-2020-16915 - Media Foundation Memory Corruption Vulnerability
    Risk Rating: Critical

    This memory corruption vulnerability exists in the mishandling of objects in memory by the Windows Media Foundation. Attackers looking to take advantage of this vulnerability must convince a user to a webpage that hosts an exploit to this vulnerability.


  • CVE-2020-16922 - Windows Spoofing Vulnerability
    Risk Rating: Important

    This spoofing vulnerability exists in the validation of file signatures. When the vulnerability is successfully exploited, it will allow loading of potentially malicious files.


  • CVE-2020-16896 - Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
    Risk Rating: Important

    This information disclousre vulnerability exists in the RDP when it checks specially crafted requests. When the vulnerability is successfully exploited, an attacker could gain information to further attacks to the vulnerable machine.


Microsoft addresses several vulnerabilities in its September security bulletin. Trend Micro Deep Security covers the following:

  • CVE-2020-0664 - Active Directory Information Disclosure Vulnerability
    Risk Rating: Important

    This information disclosure vulnerability exists in the mishandling of objects in memory by the Active Directory integrated DNS (ADIDNS). Attackers looking to take advantage of this vulnerability must be authenticated to send a specially crafted request to the ADIDNS service.


  • CVE-2020-0856 - Active Directory Information Disclosure Vulnerability
    Risk Rating: Important

    This information disclosure vulnerability exists in the mishandling of objects in memory by the Active Directory integrated DNS (ADIDNS). Attackers looking to take advantage of this vulnerability must be authenticated to send a specially crafted request to the ADIDNS service.


Featured Stories