Microsoft Issues Software Updates for 17 Critical Vulnerabilities


Microsoft has released their latest monthly Patch Tuesday update for September 2018, patching a total of 61 security vulnerabilities, out of which 17 are rated as critical, 43 are rated Important, and one Moderate in severity.

These security updates patch vulnerabilities in Microsoft Windows, Edge, Internet Explorer, MS Office, ChakraCore, .NET Framework, Microsoft.Data.OData, ASP.NET etc.

Four of the security vulnerabilities patched this month are listed as “publicly known” and more likely exploited in the wild at the time of release.

CVE-2018-8475: Windows Critical RCE Vulnerability

One of the publicly disclosed vulnerabilities is a critical remote code execution flaw (CVE-2018-8475) in Microsoft Windows and affects all versions of Windows OS, including Windows 10.

The Windows RCE vulnerability resides in the way Windows deals specially crafted image files. In order to execute a malicious code on a target system, a remote hacker has to just persuade a victim to view an image.

CVE-2018-8440: Windows ALPC Elevation of Privilege Vulnerability

An important zero-day vulnerability in Windows Advanced Local Procedure Call (ALPC) was revealed las week in Twitter and it is patched in the latest update.

This vulnerability (CVE-2018-8440) can permit a local attacker or malicious program to gain and run code with administrative system privileges on the targeted machines.

This flaw which is actively being exploited in the wild requires immediate attention. The proof-of-concept (PoC) exploit for this privilege escalation flaw in Windows is available on Github.

CVE-2018-8457: Scripting Engine Memory Corruption Vulnerability

The next publicly revealed vulnerability is a remote code execution vulnerability (CVE-2018-8457) in the scripting engine, which exists when the scripting engine fails to properly handle objects in memory in Microsoft browsers, allowing an unauthenticated, remote attacker to execute arbitrary code on a targeted system in the context of the currently logged-in user.

The vulnerability affects Microsoft Edge, Internet Explorer 11 and Internet Explorer 10.

Windows Hyper-V Remote Code Execution Vulnerabilities

The latest patch updates also include patches for two critical remote code execution vulnerabilities in Windows Hyper-V, a native hypervisor for running virtual machines on Windows servers.

The two flaws (CVE-2018-0965 and CVE-2018-8439) exist when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system.

Both RCE vulnerabilities can be exploited by a malicious guest user by running a specially crafted application on the virtual operating system to eventually execute arbitrary code on the host operating system.

Patch All Microsoft Software Vulnerabilities

Besides this, Microsoft has also pushed security updates to patch a critical remote code execution vulnerability in Adobe Flash Player.

Microsoft had marked the privilege escalation vulnerability (CVE-2018-15967) as a critical remote code execution flaw.

All the users are strictly recommended to apply all security patches at the earliest to keep malicious users away from taking control of their computers.

For installing security updates. Go to Settings → Update & security → Windows Update → Check for updates, or you can install the updates manually.

Priyanka R
Cyber Security Enthusiast, Security Blogger, Technical Editor, Author at Cyber Safe News

    British Airways Hacked Compromising 380,000 Payment Cards

    Previous article

    Tor Browser Zero-Day Vulnerability Revealed Online – Patch Now

    Next article

    You may also like


    Leave a reply

    Your email address will not be published. Required fields are marked *