• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

AllTech.News

Microsoft Patches Multiple Zero-Day Bugs

You are here: Home / Cyber Security News / Microsoft Patches Multiple Zero-Day Bugs

Microsoft fixed 74 new CVEs yesterday, including a number of zero-day vulnerabilities, a person of which is getting actively exploited in the wild.

Zero-day bug CVE-2021-40449 is a Gain32k elevation of privilege vulnerability in Windows affecting Windows 7 and Server 2008 up to Windows 11 and Server 2022. It has reportedly been exploited by Chinese risk actors recognised as “IronHusky.”

“Microsoft only rated the vulnerability as “important” by their severity scoring technique, which is a fantastic illustration of why organizations have to have to emphasis on vulnerability remediation primarily based on risk,” argued Ivanti senior director of products administration, Chris Goettl.

“A risk-based mostly technique to vulnerability administration takes into account much more authentic-entire world indicators this sort of as regarded exploited, community disclosure, and usage trends by threat actors to greater comprehend what exposures you ought to be concentrating on very first.”

Microsoft also fixed 3 publicly disclosed (zero-day) flaws which have had evidence-of-idea code launched, giving attackers a head-begin in crafting exploits for them.

These are CVE-2021-41338, a security aspect bypass vulnerability in Windows AppContainer Firewall Windows kernel elevation of privilege bug CVE-2021-41335 and Windows DNS distant code execution vulnerability CVE-2021-40469.

There was also an updated repair for CVE-2021-33781, a security function bypass flaw in Azure Ad. This vulnerability was in the beginning resolved in the July Patch Tuesday but has been current to take care of Windows 10 v1607, Server 2016 and Windows 11.

Elsewhere, Adobe up to date Acrobat, Reader, Hook up, Reader Cellular, Commerce, Campaign Normal and ops-cli.

“The updates for Adobe Join (APSB21-91) and ops-cli (APSB21-88) involve critical CVEs with a CVSS base rating of 9.8 out of 10,” stated Goettl.

“Adobe Acrobat and Reader (APSB21-104) resolves the most CVEs out of the line-up. A whole of four CVEs, two of which are rated as Critical with CVSS scores of 7.8 were fixed in this update.”

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « Apple is holding its next event on October 18th
Next Post: Lucid details the Air's semi-autonomous driving features »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © 2025 · AllTech.News, All Rights Reserved.