Microsoft patches actively exploited Windows Kernel flaw

The patch is one of 112 issued in November's Patch Tuesday

Microsoft has released fixes for 112 vulnerabilities, including an actively-exploited zero-day flaw, as part of its November 2020 Patch Tuesday, 

Of the 112 vulnerabilities fixed, 17 were classified as 'critical', 93 as 'important', and two as 'moderate'.

Among the fixes issued by Microsoft was a patch for a zero-day privilege escalation vulnerability in the Windows Kernel Cryptography Driver (cng.sys), tracked under CVE-2020-17087.

According to Tenable staff research engineer Satnam Narang, CVE-2020-17087 was “exploited in the wild as part of a vulnerability chain with CVE-2020-15999, a buffer overflow vulnerability in the FreeType 2 library used by Google Chrome”.

“The elevation of privilege vulnerability was used to escape Google Chrome’s sandbox in order to elevate privileges on the exploited system. This is the second vulnerability chain involving a Google Chrome vulnerability and a Windows vulnerability that was exploited in the last year,” he said.

Narang added that “chaining vulnerabilities is an important tactic for threat actors”.

“The Cybersecurity and Infrastructure Security Agency (CISA) published a joint advisory with the FBI last month that highlighted threat actors chaining unpatched vulnerabilities to gain initial access into a target environment and elevate privileges.

"Even though Google and Microsoft have now patched these flaws, it is imperative for organizations to ensure they’ve applied these patches before threat actors begin to leverage them more broadly."

Microsoft was also criticised for removing CVE description information from its Patch Tuesday release. Tenable CSO Bob Huber described the decision as a “bad move, plain and simple”, adding that “by relying on CVSSv3 ratings alone, Microsoft is eliminating a ton of valuable vulnerability data that can help inform organizations of the business risk a particular flaw poses to them”.

"While I appreciate that they are adopting the industry-standard format in CVSSv3, Microsoft also must consider that many folks who review Patch Tuesday releases aren’t security practitioners. They are the IT counterparts responsible for actually applying the updates who often aren’t able (and shouldn’t have to) decipher raw CVSS data,” said Huber.

Adobe has also released a small security update to resolve vulnerabilities in Connect and Reader Mobile. This comes just days after the software provider urged Windows and macOS users to update their Acrobat and Reader applications after discovering that they contained flaws that could be exploited to execute arbitrary code.

Featured Resources

How to be an MSP: Seven steps to success

Building your business from the ground up

Download now

The smart buyer’s guide to flash

Find out whether flash storage is right for your business

Download now

How MSPs build outperforming sales teams

The definitive guide to sales

Download now

The business guide to ransomware

Everything you need to know to keep your company afloat

Download now

Recommended

Trend Micro and Snyk team up to combat open source vulnerabilities
vulnerability

Trend Micro and Snyk team up to combat open source vulnerabilities

10 May 2021
Virtual desktops and apps for dummies
Whitepaper

Virtual desktops and apps for dummies

10 May 2021
Prevent fraud and phishing attacks with DMARC
Whitepaper

Prevent fraud and phishing attacks with DMARC

10 May 2021
The total economic impact™ Of Mimecast
Whitepaper

The total economic impact™ Of Mimecast

10 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021