Microsoft Windows Zero-Day Windows 10 Hacking Attack Warning Update Now
Most information security professionals are struggling to cope with the current and truly frightening situation Log4J vulnerability (also known as Log4Shell). But, unfortunately, Log4J isn’t the only shark in the security pool: millions of Windows 10 users must be aware of one zero-day threat in particular.
The bad news is that attackers are already exploiting CVE-2021-43890 to install the nasty Emotet, or Trickbot, credential-stealing malware. The good news is that Microsoft has the fix and you should apply it. Now.
Yes, this week sees the last round of security patches from Microsoft Patch Tuesday in 2021, and that’s a big deal. In total, more than sixty vulnerabilities have been patched across Microsoft’s product line, including Windows, Visual Studio, Office, PowerShell, and SharePoint Server, to name a few. Seven of the patched vulnerabilities were rated critical, and there are six zero days set for good measure.
However, millions of Windows 10 users are worried about this day zero, which is publicly leaked and exploited by attackers in the wild. CVE-2021-43890 is a spoofing vulnerability in the Windows AppX installer and is used to deliver some truly awful malware.
Exploits take the form of malicious software packages installed when unsuspecting users open infected documents, etc. Obviously, users with administrator account rights will be most at risk here. That said, when chained with another feat it might be possible to impact those with fewer user rights to obtain enough privileges to run the malicious code.
You know what to do, install this Windows update as soon as possible
Davey Winder
Microsoft has confirmed that exploitation is already underway: “Microsoft is aware of attacks that attempt to exploit this vulnerability using specially crafted packages that include the malware family known as Emotet/Trickbot/ Bazaloader,” he said in the latest security update guide.
“Given the critical nature of this vulnerability and the fact that there is active exploitation,” said Chad McNaughton, Technical Community Manager at Automox, “Organizations should take immediate action to address it within the next 24 time”.
This warning has been given, dear reader, December 14. So the clock is definitely ticking on this one.
The remaining zero-day vulnerabilities that were patched by Microsoft this Patch Tuesday are:
- CVE-2021-43240 is an elevation of privilege vulnerability affecting Windows 10, Windows 11, and Windows Server users.
- CVE-2021-41333 is an elevation of privilege vulnerability affecting Windows 10, Windows 11, and Windows Server users.
- CVE-2021-43880 is an elevation of privilege vulnerability affecting Windows 11 users.
- CVE-2021-43883 is an elevation of privilege vulnerability affecting Windows 10, Windows 11, and Windows Server users.
- CVE-2021-43893 is an elevation of privilege vulnerability affecting Windows 10, Windows 11, and Windows Server users.
Hoping that you will spend the happiest of the end of the year celebrations. Considering everything going on in the world right now, I understand that this may be a more stressful time of year than we would like. So don’t let Windows security issues add to this anxiety, install this update now.
Comments are closed.