Microsoft Releases Patches for Several Vulnerabilities, Some Currently Exploited in the Wild

NJCCIC Alert

Original Release Date: 2/11/2021

Summary

Microsoft urges customers to apply recent updates as soon as possible after they identified and patched critical and high severity vulnerabilities. Three of these are vulnerabilities in Windows TCP/IP affecting Windows 7 and higher, both client and server versions. CVE-2021-24074 and CVE-2021-24094 are remote code execution vulnerabilities and are considered difficult to exploit. However, a separate denial-of-service (DOS) vulnerability, CVE-2021-24086, is easier to exploit and Microsoft considers its exploitation in the wild imminent. The DOS vulnerability may allow a remote threat actor to cause a stop error resulting in a blue screen on any Windows system directly exposed to the internet. Additionally, a security advisory was released to address CVE-2021-1732, a privilege escalation vulnerability found in Microsoft Win32k. This vulnerability has been exploited in the wild and impacts Windows 10 and Windows 2019 servers.

Recommendations

The NJCCIC urges users to apply patches immediately after appropriate testing. Workarounds are also available for those systems that cannot be patched immediately. Additional information can be found in the MSRC update guide and the ZDNet article.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.