Author: Melodie Foster
Date: 10th February 2021
Microsoft have patched a total of 56 CVE’s including a zero-day that is being actively exploited. The most severe issue being Windows Win32k.sys elevation of privilege vulnerability which affects Windows 10 and Windows Server 2019.
Another critical issue is a Windows DNS Server remote code execution. It has been assigned a CVSS score of 9.8 out of 10 and it affects Windows Server 2008 through 2019. It works by getting a vulnerable DNS server to make a query for a domain that is it has not seen before; this can be done, for example, by using a phishing email which has a link to a new domain.
There are a further six flaws where either a proof-of-concept code or other information related to the flaw has been released which could aid an attacker into manging to be able to successfully exploit them.
The next few serious flaws include a bug in Sysinternals PsExec which could allow for an attacker to be able to elevate their privileges, a remote code execution bug in .Net Core and a Denial of Service bug in Visual Studio.
To mitigate these risks, it is recommended to make sure all your software is running the latest version.
Other resources

Cyberfort Colocation Services
Cyberfort has invested heavily in secure infrastructure, making us the perfect colocation service provider to host your mission-critical, sensitive and regulated data.
Find out more >

What can Cyberfort do for you?
Check out our factsheets for detailed information on the matrix of cybersecurity products and services we offer to protect your business.
Find out more >

Cyberfort Deep Dives
Cyberfort’s cybersecurity consultants explore issues in cyber threat intelligence, incident planning and data security. Read our whitepapers to help make decisions that benefit your business.
Find out more >
Recent Comments