Learn Search

Search across all Learn content

← Back to Security Research
Microsoft September Patch Tuesday Addresses 60 CVEs Including 3 Critical

Microsoft September Patch Tuesday Addresses 60 CVEs Including 3 Critical

Microsoft Patch Tuesday September 2021 security update fixes a total of 60 vulnerabilities, which include Three CVEs rated as critical and the rest rated as important. The products covered in September’s security update include Microsoft Office, Windows Common Log File System Driver, Windows Print S...

Sep 14, 2021By Gururaj Otageri3 min read

Microsoft Patch Tuesday September 2021 security update fixes a total of 60 vulnerabilities, which include Three CVEs rated as critical and the rest rated as important. The products covered in September’s security update include Microsoft Office, Windows Common Log File System Driver, Windows Print Spooler Components, etc.

One of the already publicly disclosed CVEs resolves a critical zero-day vulnerability (CVE-2021-40444) in MSHTML, also known as Microsoft’s legacy Trident rendering engine.

Zero-day Vulnerability

CVE-2021-40444 Microsoft’s MSHTML (Trident) engine Remote Code Execution Vulnerability. Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. An attacker could craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine. The attacker would then need to convince the user to open the malicious document. Users whose accounts are configured to possess fewer user rights on the system might be less impacted than users who operate with administrative user rights.

Critical Vulnerabilities

CVE-2021-26435Windows Scripting Engine Memory Corruption Vulnerability. Microsoft released patches addressing a critical remote code execution vulnerability in Windows Scripting Engine. Exploiting this vulnerability requires an attacker to convince users to click a link then open a specially crafted file.

CVE-2021-36965Windows WLAN AutoConfig Service Remote Code Execution Vulnerability. Microsoft released patches addressing a remote code execution flaw in “WLAN AutoConfig,” the component in Windows 10 and many Server versions that handle auto-connections to Wi-Fi networks. One mitigating factor here is that the attacker and target would need to get on the same network. However, many systems are configured to auto-connect to Wi-Fi network names with which they have previously connected.

CVE-2021-38647Open Management Infrastructure Remote Code Execution Vulnerability. This vulnerability requires no user interaction or privileges, so an attacker can run their code on an affected system just by sending a specially crafted message to an affected system.

Microsoft security bulletin summary for August 2021

  • Microsoft Azure Open Management Infrastructure
  • Microsoft Edge (Chromium-based)
  • Microsoft Office
  • Microsoft Windows
  • Visual Studio
  • Windows Installer
  • Windows Kernel
  • Windows MSHTML Platform
  • Windows SMB
  • Windows Storage

Product: Microsoft AzureCVEs/Advisory: CVE-2021-38649, CVE-2021-38648, CVE-2021-38645, CVE-2021-36956, CVE-2021-38647Impact: Elevation of Privilege, Information Disclosure, Remote Code ExecutionSeverity: Critical, Important

Product: Microsoft OfficeCVEs/Advisory: CVE-2021-38658, CVE-2021-38650, CVE-2021-38646, CVE-2021-38655, CVE-2021-38654, CVE-2021-38653Impact: Remote Code Execution, SpoofingSeverity: ImportantKBs: 4484103, 4484108, 5001958, 5001997, 5001999, 5002005, 5002007, 5002009

Product: Microsoft Visual StudioCVEs/Advisory: CVE-2021-36952, CVE-2021-26434, CVE-2021-26437Impact: Remote Code Execution, Elevation of Privilege, SpoofingSeverity: Important

SanerNow VM and SanerNow PM detect these vulnerabilities and automatically fix them by applying security updates. Use SanerNow and keep your systems updated and secure.

Microsoft September Patch Tuesday Addresses 60 CVEs Including 3 Critic | SecPod