

Microsoft has also published this blog to aid Exchange administrators with their patch deployment. As with all Exchange bugs in the wild, we urge Exchange admins to test and deploy the patches as soon as possible. This Exchange bug is listed by Microsoft as currently under active attack however, authentication is listed as a requirement.

Update visual studio code#
CVE-2021-42321 – Microsoft Exchange Server Remote Code Execution Vulnerability Let’s take a closer look at some of the more interesting updates for this month, starting with the two bugs listed as under active attack: Four of these bugs are listed as publicly known two are listed as under active exploit at the time of release.

Four of these bugs came through the ZDI program. Of the CVEs patched today, six are rated Critical and 49 are rated as Important in severity. It seems odd that Microsoft would be releasing fewer patches after seeing nothing but increases across the industry for years. Given that December is typically a slower month patch-wise, it causes one to wonder if there is a backlog of patches awaiting deployment due to various factors. Even going back to 2018 when there were only 691 CVEs fixed all year, there were more November CVEs fixed than in this month. Last year, there were more than double this number of CVEs fixed. Historically speaking, 55 patches in November is a relatively low number.
Update visual studio windows#
None of the patches released today by Adobe are listed as being publicly known or under active attack at the time of release.įor November, Microsoft released patches today for 55 new CVEs in Microsoft Windows and Windows Components, Azure, Azure RTOS, Azure Sphere, Microsoft Dynamics, Microsoft Edge (Chromium-based), Exchange Server, Microsoft Office and Office Components, Windows Hyper-V, Windows Defender, and Visual Studio. None of these fixes were listed as under active attack, so it’s unclear why Adobe released so many patches out of band. If this seems especially light, Adobe did release fixes for more than 80 CVEs in late October for critical code execution flaws, privilege escalation, denial-of-service, and memory leaks across multiple products. Either way, a Critical-rated arbitrary code execution bug is being fixed, so if you still use RoboHelp, apply this hotfix. The release for Ro bo Help Server is listed as a security hotfix rather than a security patch, but it’s not clear why there’s a difference in the nomenclature. The InC opy patch fixes two bugs, including a Critical-rated code execution. The patch for Creat ive C loud fixes a single Important-rated denial-of-service (DoS) bug. Take a break from your regularly scheduled activities and join us as we review the details for their latest security offerings.įor November, Adobe released only three patches correcting four CVEs in Creative Cloud Desktop, InCopy, and RoboHelp. The second Tuesday of the month is upon us, and with it comes the latest security patches from Adobe and Microsoft.
