Patch Tuesday July 2021 Edition…PrintNightmare, Windows RCEs and More Exchange RCEs
What We Know
For Patch Tuesday July 2021, Microsoft is patching the vulnerability and ongoing exploitation of PrintNightmare. You can read about CVE-2021-34527 on the Microsoft vulnerability site here. This one is really causing a lot of pain for organizations and CISA has also released Emergency Directive 21-04 that outlines what and when Federal Civilian Executive Branch agencies must do to mitigate this one.
For this month, Microsoft is addressing 117 total vulnerabilities, 13 of which are of the Critical rating, 103 have the Important rating, and 1 has a Moderate rating in severity.
That is a lot of CVEs!
The 13 Critical are listed below; we feel that CVE-2021-34527 “PrintNightmare” should be a top priority for every organization:
CVE-2021-34527 – Windows Print Spooler Components – Windows Print Spooler RCE Vulnerability (actively exploited)
CVE-2021-34448 – Microsoft Scripting Engine – Scripting Engine Memory Corruption Vulnerability (actively exploited)
CVE-2021-34474 – Dynamics Business Central Control – Dynamics Business Central RCE Vulnerability
CVE-2021-34473 – Microsoft Exchange Server – Microsoft Exchange Server RCE Vulnerability
CVE-2021-33740 – Microsoft Windows Codecs Library – Windows Media RCE Vulnerability
CVE-2021-34439 – Microsoft Windows Media Foundation – Microsoft Windows Media Foundation RCE Vulnerability
CVE-2021-34503 – Microsoft Windows Media Foundation – Microsoft Windows Media Foundation RCE Vulnerability
CVE-2021-34494 – (server role) DNS Server – Windows DNS Server RCE Vulnerability
CVE-2021-34450 – (server role) Hyper-V – Windows Hyper-V RCE Vulnerability
CVE-2021-34522 – Windows Defender – Microsoft Defender RCE Vulnerability
CVE-2021-34464 – Windows Defender – Microsoft Defender RCE Vulnerability
CVE-2021-34458 – Windows Kernel – Windows Kernel RCE Vulnerability
CVE-2021-34497 – Windows MSHTML Platform – Windows MSHTML Platform RCE Vulnerability
There are also several on-premises Exchange Server vulnerabilities released, including the above Critical (RCE), and three were addressed in April but not discussed until this release.
What should you be doing?
The vulnerabilities that were released this month are significant and should be patched as soon as possible following your normal change and testing processes. You should also be looking at the vulnerabilities and updates on your perimeter security devices on a regular basis. When performing penetration tests for clients, our team often finds unpatched systems left open and vulnerable.
The latest patches can be viewed on the Microsoft Security Response Center (MSRC) website. As usual, you must follow the instructions for any of these updates and test thoroughly before upgrading your entire environment.
How long before more POC exploits are made public?
POC exploits are on the rise and aren’t going away anytime soon. If there ever were a time to enhance your vulnerability management program to deal with vulnerabilities like these and out-of-band zero-day vulnerabilities, it is NOW.
Steps you can take now: