top of page
Writer's pictureTechnicalsupportservices

August Patch Tuesday Fixes Critical IE, Major Windows Vulnerabilities Exploited from the Wild

Even the August batch of Patch Tuesday updates comprises 120 updates for the Microsoft package, together with 17 repairs rated as Critical, and the remaining 103 rated as Crucial. Is a vital Internet Explorer (IE) vulnerability that can be mistreated for remote code execution (RCE), whereas still is a Windows 10 security gap that can be used for spoofing. Administrators are advised to update their systems whenever possible as both flaws are discovered being exploited in the wild. The Zero Day Initiative (ZDI) disclosed 11 flaws, five of which are critical bugs that revealed RCE vulnerabilities, whereas the remaining half are ranked as important vulnerabilities that can be abused to acquire escalation of rights, RCE, information disclosure, and spoofing.


Currently abused in the wild

Two of the repairs speech updates for vulnerabilities currently being exploited in the wild. CVE-2020-1380 is a search motor memory corruption vulnerability in IE11 which permits an attacker to run arbitrary code as the user when mistreated.


Malicious actors may use several techniques to exploit this gap. An attacker can create a specially crafted site to exploit the flaw through IE by prompting the user with social engineering methods, or by embedding ActiveX controls to open it using an IE browser. trend micro login They're also able to use endangered websites or pages that accept or host user-generated content and advertisements that could exploit the vulnerability.


Meanwhile, spoofing vulnerability that occurs when Windows wrongly supports files' digital signatures. An attacker can exploit this flaw to circumvent security attributes and load malicious files, such as PDFs or Office file documents, onto systems.

Other Crucial IE, Outlook, along with HTML flaws through RCE


This release also includes three additional fixes for significant media vulnerabilities. Is an MSHTML engine unsuitable input validation flaw an attacker can exploit using a specially crafted document loaded from the current user to run arbitrary code? When the current user has full administrative rights in the machine, the attacker can use it to install programs; see, alter, and delete information; and create new accounts with the same user rights.


Outlook memory corruption vulnerability that may be utilized to run arbitrary code in the current user's context. It impacts an individual with full administrative rights more severely compared to a user with fewer rights, but may nevertheless have some controller and make unauthorized changes in this program. An attacker can exploit this flaw by forcing a user to open a malicious email or attachment or use a malicious or compromised website via an embedded link included in this message.


Exploited by an attacker to run malicious code remotely via IE. This scripting engine memory corruption difference could permit an attacker to take control of a platform with full user rights. Similar .an attacker may undermine legitimate websites or create a specific webpage to exploit the vulnerability and enabling the user to load on the website using IE.

Trend Micro answers


Vulnerabilities being exploited in the wild indicate that cybercriminals might already be studying or developing routines that could abuse these openings in systems. And while safety administrators might simultaneously implement some of the updates, users -- especially people that are working from home -- are advised to download the individual patches for their systems instantly.

5 views0 comments

Recent Posts

See All

Comments


bottom of page