Alerts popped up on Friday, and have poured forth ever since. There's no end to the amount of alerts about a security flaw in Log4j. Good commentary by Automox security experts can also be found in Automox's December "Patch Tuesday" post.Īlso released this month were Adobe patches, Apple patches and Google Chrome patches. If patching isn't an option, Microsoft has provided some workarounds to protect against the exploitation of this vulnerability.Ī nice overall summary of Microsoft's December patches can be found in this Trend Micro Zero Day Initiative post by Dustin Childs. Once exploited, the vulnerability would grant an attacker elevated privileges, particularly when the victim’s account has administrative privileges on the system. He explained how an attack might work, as follows: To exploit this vulnerability, an attacker would need to convince a user to open a malicious attachment, which would be conducted through a phishing attack. It's this month's zero-day vulnerability.ĬVE-2021-43890 has been "linked to attacks associated with the Emotet/TrickBot/Bazaloader family," which was shut down in January but reemerged in November, according to Satnam Narang, staff research engineer at security solutions firm Tenable, via e-mail. In addition, one of those six Important vulnerabilities, namely CVE-2021-43890, a Windows AppX Installer spoofing flaw for Windows 10 systems, is known to have been exploited. There are six "Important" vulnerabilities, but they've all been publicly exposed before Microsoft's Tuesday patch release, which ups risks for organizations. Of Microsoft's December patch total, seven vulnerabilities are labeled "Critical" by security researchers. Microsoft on Tuesday released security patches for 67 common vulnerabilities and exploits, even as organizations are scrambling to address a Log4j flaw in Apache servers that's under active exploit.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |