Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2021-May
Reports indicated that the remote code execution vulnerability in Microsoft Windows 10 and some versions of Windows Server is likely to be exploited. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Internet Explorer 9, 11
- Microsoft Windows 7, 8.1, RT 8.1, 10
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019
- Microsoft Windows Server, version 1909, version 2004, version 20H2
- Microsoft Office 2013, 2013 RT, 2016, 2019, 2019 for Mac
- Microsoft Office Online Server
- Microsoft Office Web Apps Server 2013
- Microsoft Excel 2013, 2013 RT, 2016
- Microsoft Word 2013, 2013 RT, 2016
- Microsoft 365 Apps for Enterprise
- Microsoft Exchange Server 2013, 2016, 2019
- Microsoft Accessibility Insights for Web
- Microsoft SharePoint Foundation 2013
- Microsoft SharePoint Enterprise Server 2016
- Microsoft SharePoint Server 2019
- Microsoft Visual Studio 2019
- .NET 5.0, Core 3.1
- Dynamics 365 for Finance and Operations
- Microsoft Lync Server 2013
- Skype for Business Server 2015, 2019
- Visual Studio 2019 for Mac version 8.9
- Visual Studio Code, Remote - Containers Extension
- Web Media Extensions
- common_utils.py (Neural Network Intelligence)
Impact:
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, information disclosure, denial of service, security feature bypass and spoofing.
Recommendation:
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/en-us/releaseNote/2021-May
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-may
- https://us-cert.cisa.gov/ncas/current-activity/2021/05/11/microsoft-releases-may-2021-security-updates
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26418
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26419
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26421
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26422
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27068
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28455
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28461
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28465
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28474
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28476
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28478
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28479
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31165 (to CVE-2021-31182)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31184 (to CVE-2021-31188)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31190 (to CVE-2021-31195)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31198
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31204
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31205
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31207 (to CVE-2021-31209)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31211
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31213
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31214
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31936