• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Microsoft Fixes Windows Defender Zero-Day Bug

You are here: Home / General Cyber Security News / Microsoft Fixes Windows Defender Zero-Day Bug

Microsoft has patched a zero-day bug in Windows Defender being actively exploited in the wild, as part of its monthly update round.

The first Patch Tuesday of 2021 featured fixes for 83 vulnerabilities in Windows OS, Edge, Office, Visual Studio, .Net Core, .Net Repository, ASP .Net, Azure, Malware Protection Engine and SQL Server.

Remote code execution bug CVE-2021-1647 is the most urgent, according to Chris Goettl, director of product management for security products at Ivanti. He recommended organizations ensure their Microsoft Malware Protection Engine is version 1.1.17700.4 or higher.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Ultimate Suite 2021

Protect yourself against all threads using AVAST Ultimate Suite. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium. In addition it comes with AVAST's well-known VPN service SecureLineVPN. Therefore, it will be a security and privacy in one package.

Get AVAST Ultimate Suite with 65% discount certified seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Microsoft frequently updates malware definitions and the malware protection engine and has already pushed the update to resolve the vulnerability,” Goettl explained.

“For organizations that are configured for automatic updating no actions should be required, but one of the first actions a threat actor or malware will try to attempt is to disrupt threat protection on a system so definition and engine updates are blocked.”

Another CVE high up the priority list this month is CVE-2021-1648, a bug in the Windows splwow64 service that could allow an attacker to elevate their privilege level. Although publicly disclosed last month it isn’t thought to have been exploited yet.

Experts also highlighted CVE-2021-1666 as worthy of attention: the flaw in Microsoft’s GDI+ component impacts the unsupported Windows 7 and Windows Server 2008 products, as well as newer versions.

Allan Liska, senior security architect at Recorded Future, also flagged CVE-2021-1709, an elevation of privilege vulnerability in the Win32 kernel. The bug, which affects Windows 8-10 and Windows Server 2008-2019, should be prioritized despite its “Important” rating, he argued.

“Unfortunately, this type of vulnerability is often quickly exploited by attackers,” Liska warned. “For example, CVE-2019-1458 was announced on December 10 2019, and by December 19 an attacker was seen selling an exploit for the vulnerability on underground markets.”

Elsewhere, Adobe released fixes for vulnerabilities in its Adobe Bridge, Captivate, InCopy, Campaign Classic, Animate, Illustrator and Photoshop products. There was also a critical Mozilla Thunderbird update.


Some parts of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Intel Adds Hardware Enabled Ransomware Detection To 11th Gen Vpro Chips Intel Adds Hardware-Enabled Ransomware Detection to 11th Gen vPro Chips

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Microsoft Fixes Windows Defender Zero-Day Bug
  • Intel Adds Hardware-Enabled Ransomware Detection to 11th Gen vPro Chips
  • Healthcare Hit by 187 Million Monthly Web App Attacks in 2020
  • World’s largest dark web marketplace taken offline
  • Cybereason to Adopt Intel’s PC Hardware Ransomware Solution
  • Buyer’s Guide for Securing Internal Environment with a Small Cybersecurity Team
  • Authorities Take Down World’s Largest Illegal Dark Web Marketplace
  • Hackers Steal Mimecast Certificate Used to Securely Connect with Microsoft 365
  • Microsoft Issues Patches for Defender Zero-Day and 82 Other Windows Flaws
  • Ubiquiti urges password reset, 2fa after breach

Copyright © TheCyberSecurity.News, All Rights Reserved.