Security News > 2021 > August > Microsoft patches actively exploited zero-day (CVE-2021-36948), more Print Spooler flaws

Microsoft patches actively exploited zero-day (CVE-2021-36948), more Print Spooler flaws
2021-08-10 20:26

Microsoft's August 2021 Patch Tuesday is pretty lightweight, through it covers a wide variety of Microsoft solutions.

44 CVE-numbered security holes have been plugged, seven of which are critical, and one is actively exploited.

CVE-2021-36948 is a vulnerability in the Windows Update Medic Service that can be exploited by attackers to escalate privileges on a compromised system.

The company has fixed three Windows Print Spooler bugs: one "Critical"(CVE-2021-36936) and two "Important".

Because of the ubiquitous nature of the Windows Print Spooler within networks, organizations should prioritize patching these flaws as soon as possible," advised Satnam Narang, staff research engineer at Tenable.

"Microsoft released this patch to further protect against NTLM relay attacks by issuing this update to block the LSARPC interface. This will impact some systems, notably Windows Server 2008 SP2, that use the EFS API OpenEncryptedFileRawA function," explained Dustin Childs, with Trend Micro's Zero Day Initiative.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/zjgRdOt8UkE/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2021-08-12 CVE-2021-36948 Unspecified vulnerability in Microsoft products
Windows Update Medic Service Elevation of Privilege Vulnerability
0.0
2021-08-12 CVE-2021-36936 Unspecified vulnerability in Microsoft products
Windows Print Spooler Remote Code Execution Vulnerability
0.0

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Microsoft 365 49 1366 2822 162 4399