Microsoft Patch Tuesday Includes Six Zero Day-Related Vulnerabilities

Robinson+Cole Data Privacy + Security Insider

[co-author: Kelly Sweeney]

IT professionals leave room in their schedules for Microsoft’s monthly Patch Tuesday just as I leave room in my schedule every Wednesday night for blog writing. This month’s Patch Tuesday was light on patches compared to other months, but includes six that are designed to patch zero day-related vulnerabilities, four of which are relevant to elevation of privilege flaws.

No question, the ability of threat actors to escalate privileges in a system or application is a major concern for data security, as it may allow threat actors to access and exfiltrate the most sensitive data in a company’s system. It also may give the threat actor the ability to destroy backup systems and security tools designed to detect compromises and plant malware and ransomware unseen. This is exactly what threat actors are doing with Prometheus ransomware [view related post].

Microsoft urged users to patch these zero day vulnerabilities, as threat actors are using the vulnerabilities to launch targeted attacks against users.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Robinson+Cole Data Privacy + Security Insider | Attorney Advertising

Written by:

Robinson+Cole Data Privacy + Security Insider

Robinson+Cole Data Privacy + Security Insider on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.