This month’s Patch Tuesday comes in the middle of a global effort to mitigate Apache Log4j CVE-2021-44228. In today’s security release, Microsoft issued fixes for 83 vulnerabilities across an array of products — including a fix for Windows Defender for IoT, which is vulnerable to CVE-2021-44228 amongst seven other remote code execution (RCE) vulnerabilities (the cloud service is not affected). Six CVEs in the bulletin have been publicly disclosed; the only vulnerability noted as being exploited in the wild in this month’s release is , a Windows AppX Installer spoofing bug that may aid in social engineering attacks and has evidently been used in Emotet malware campaigns.
Interestingly, this round of fixes also includes , a Windows Installer privilege escalation bug whose advisory is sparse despite the fact that it appears to affect all supported versions of Windows. While there’s no indication in the advisory that the two vulnerabilities are related, CVE-2021-43883 looks an awful lot like the fix for a zero-day vulnerability that made a splash in the security community last month after proof-of-concept exploit code was released and in-the-wild attacks began. The zero-day vulnerability, which researchers hypothesized was a patch bypass for CVE-2021-41379, allowed low-privileged attackers to overwrite protected files and escalate to SYSTEM. Rapid7’s vulnerability research team did a full root cause analysis of the bug as attacks ramped up in November.
As usual, RCE flaws figure prominently in the “Critical”-rated CVEs this month. In addition to Windows Defender for IoT, critical RCE bugs were fixed this month in Microsoft Office, Microsoft Devices, Internet Storage Name Service (iSNS), and the WSL extension for Visual Studio Code. Given the outsized risk presented by most vulnerable implementations of Log4Shell, administrators should prioritize patches for any products affected by CVE-2021-44228. Past that, put critical server-side and OS RCE patches at the top of your list, and we’d advise sneaking in the fix for CVE-2021-43883 despite its lower severity rating.
Summary charts
Summary tables
Apps Vulnerabilities
CVE
Vulnerability Title
Exploited
Publicly Disclosed?
CVSSv3
Has FAQ?
Windows AppX Installer Spoofing Vulnerability
Yes
Yes
7.1
Yes
Microsoft Office app Remote Code Execution Vulnerability
No
No
9.6
Yes
Browser Vulnerabilities
CVE
Vulnerability Title
Exploited
Publicly Disclosed?
CVSSv3
Has FAQ?
Chromium: CVE-2021-4068 Insufficient validation of untrusted input in new tab page
No
No
N/A
Yes
Chromium: CVE-2021-4067 Use after free in window manager
No
No
N/A
Yes
Chromium: CVE-2021-4066 Integer underflow in ANGLE
No
No
N/A
Yes
Chromium: CVE-2021-4065 Use after free in autofill
No
No
N/A
Yes
Chromium: CVE-2021-4064 Use after free in screen capture
No
No
N/A
Yes
Chromium: CVE-2021-4063 Use after free in developer tools
No
No
N/A
Yes
Chromium: CVE-2021-4062 Heap buffer overflow in BFCache
No
No
N/A
Yes
Chromium: CVE-2021-4061 Type Confusion in V8
No
No
N/A
Yes
Chromium: CVE-2021-4059 Insufficient data validation in loader
No
No
N/A
Yes
Chromium: CVE-2021-4058 Heap buffer overflow in ANGLE
No
No
N/A
Yes
Chromium: CVE-2021-4057 Use after free in file API
No
No
N/A
Yes
Chromium: CVE-2021-4056: Type Confusion in loader
No
No
N/A
Yes
Chromium: CVE-2021-4055 Heap buffer overflow in extensions
No
No
N/A
Yes
Chromium: CVE-2021-4054 Incorrect security UI in autofill
No
No
N/A
Yes
Chromium: CVE-2021-4053 Use after free in UI
No
No
N/A
Yes
Chromium: CVE-2021-4052 Use after free in web apps
No
No
N/A
Yes
Developer Tools Vulnerabilities
CVE
Vulnerability Title
Exploited
Publicly Disclosed?
CVSSv3
Has FAQ?
Visual Studio Code WSL Extension Remote Code Execution Vulnerability
No
No
9.8
No
Visual Studio Code Spoofing Vulnerability
No
No
nan
No
Visual Studio Code Remote Code Execution Vulnerability
No
No
7.8
No
Microsoft PowerShell Spoofing Vulnerability
No
No
5.5
No
Microsoft BizTalk ESB Toolkit Spoofing Vulnerability