Patch Tuesday: Microsoft Releases 50 Security Updates

by

June 14, 2021

Microsoft has released a WHOPPING 50 security updates! This most recent “Patch Tuesday” focused on patching everything from remote code execution (RCE), denial-of-service, privilege escalation, and memory corruption problems.

The patches include a few for newly discovered zero-day vulnerabilities. They are:

  • CVE-2021-33742 – Windows MSHTML Platform Remote Code Execution Vulnerability, CVSS 7.5
  • CVE-2021-33739 – Microsoft DWM Core Library Elevation of Privilege Vulnerability, CVSS 8.4
  • CVE-2021-31199 – Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability, CVSS 5.2
  • CVE-2021-31201 – Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability, CVSS 5.2
  • CVE-2021-31955 – Windows Kernel Information Disclosure Vulnerability, CVSS 5.5
  • CVE-2021-31956 – Windows NTFS Elevation of Privilege Vulnerability, CVSS 7.8

If you’re looking for more information regarding the other CVEs included in this “Patch Tuesday” update, please visit Microsoft’s Security Response Center.

We recommend you check out the above-linked pages and see if your systems and end-points are patched/protected.

Like our blog? Subscribe using the CTA in the upper right-hand corner of this page. Feel like sharing your thoughts with us? Use the comment section below.

Carl Keyser is the Content Manager at Integris.

Keep reading

Strong Cybersecurity Postures: How to Unleash their Power

Strong Cybersecurity Postures: How to Unleash their Power

In the vast digital landscape where virtual dragons and sneaky trolls roam a strong cybersecurity posture has never been more important. Imagine a band of modern-day knights led by our protagonist, Alex. Armed with a trusty laptop and a cup of coffee, Alex navigates...

How to Spot a Phishing Attack in 2023

How to Spot a Phishing Attack in 2023

In 2023 cyber threats lurk behind every tree trunk in today's digital jungle, and cybersecurity awareness is more critical than ever. Among the craftiest of these threats are phishing attacks. Phishing attacks are cunningly engineered with social manipulation at their...

How to Choose an IT Consultant in Boulder, CO

Regardless of industry size or type, Boulder IT consultants play a massive role in the way companies in the Boulder area do business. While most companies may have their own in-house IT department, many of these departments are small and cannot handle all the...