Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

Microsoft June Update Fixes Multiple Zero-Days Exploited in the Wild

Issued: 
Wednesday, 9 June, 2021
Last Revision: 
Wednesday, 9 June, 2021
Vendor: 
Product: 
Threat Actor: 
Severity Level: 
Summary: 

Microsoft has released its June 2021 security update with 55 critical and important vulnerabilities in multiple products. A threat actor PuzzleMaker has been exploiting both CVE-2021-31955 and CVE-2021-31956 while utilizing unpatched Chrome (CVE-2021-21220).

 

 Six zero-day vulnerabilities are being actively exploited:

  • CVE-2021-31955 - Windows Kernel Information Disclosure Vulnerability 
  • CVE-2021-31956 - Windows NTFS Elevation of Privilege Vulnerability
  • CVE-2021-33739 - Microsoft DWM Core Library Elevation of Privilege Vulnerability
  • CVE-2021-33742 - Windows MSHTML Platform Remote Code Execution Vulnerability
  • CVE-2021-31199 - Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
  • CVE-2021-31201 - Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability

 

It is strongly advised to apply the recommendations below in order to prevent security incidents from happening.

Recommendation: 

It is recommended to apply these security updates as soon as possible to prevent vulnerability exploitation.

Please do review andd assess critical systems for such malicious activities related to possible exploitation of these vulnerabilities.

 

Please note that the Q-CERT Incident Response Team will be available on call through our following Hotline details:

  • Q-CERT Hotline Numbers:  (+974) 4493-3408 / (+974) 4499-5444
  • For reporting an incident, please send an email to: incidents@qcert.org
  • Visit our website to report an incident: www.qcert.org