{"id":259023,"date":"2021-11-02T15:15:29","date_gmt":"2021-11-02T14:15:29","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=259023"},"modified":"2021-11-02T16:11:24","modified_gmt":"2021-11-02T15:11:24","slug":"microsoft-security-update-releases-nachtrag-vom-oktober-2021","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2021\/11\/02\/microsoft-security-update-releases-nachtrag-vom-oktober-2021\/","title":{"rendered":"Microsoft Security Update Releases &#8211; Nachtrag vom Oktober 2021"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2021\/11\/02\/microsoft-security-update-releases-nachtrag-vom-oktober-2021\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Microsoft hat im Oktober 2021 einige Security Update Releases-Benachrichtigungen und auch Revisionen publiziert. Da ich bisher nicht alles thematisieren konnte, fasse ich die betreffenden Meldungen in einem Sammelbeitrag zusammen. Die Sicherheitsinfos reichen von einer \"Windows Key Storage Provider Security Feature Bypass Vulnerability\" bis hin zur\u00a0 Azure AD Security Feature Bypass Vulnerability.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg08.met.vgwort.de\/na\/38d323b2fa43424081cc81474af6b2dc\" alt=\"\" width=\"1\" height=\"1\" \/>**********************************************************<br \/>\nTitle: Microsoft Security Update Releases<br \/>\nIssued: October 12, 2021<br \/>\n**********************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2021-38624<br \/>\n* CVE-2021-33781<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-38624\" target=\"_blank\" rel=\"noopener\">CVE-2021-38624<\/a><\/p>\n<p>&#8211; Windows Key Storage Provider Security Feature Bypass Vulnerability<br \/>\n&#8211; Version 2.0<br \/>\n&#8211; Reason for Revision: The following revisions have been made: 1) To comprehensively<br \/>\naddress CVE-2021-38624, Microsoft has released the October 2021 Security Updates<br \/>\nfor all affected editions of Windows 10 Version 1809 and newer because these versions<br \/>\nare also affected by CVE-2021-38624. 2) In the Security Updates table, Windows 11 for<br \/>\nx64-based systems and Windows 11 for ARM64-based systems have been added as Windows 11<br \/>\nis also affected by this vulnerability. Microsoft strongly recommends that customers<br \/>\ninstall the October updates to be fully protected from this vulnerability. Customers<br \/>\nwhose systems are configured to receive automatic updates do not need to take any<br \/>\nfurther action.<br \/>\n&#8211; Originally posted: September 14, 2021<br \/>\n&#8211; Updated: October 12, 2021<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-33781\" target=\"_blank\" rel=\"noopener\">CVE-2021-33781<\/a><\/p>\n<p>&#8211; Azure AD Security Feature Bypass Vulnerability<br \/>\n&#8211; Version 2.0<br \/>\n&#8211; Reason for Revision: In the Security Updates table, added all supported versions<br \/>\nof Windows 10 Version 1607, Windows Server 2016, and Windows 11 because these versions<br \/>\nof Windows 10, Windows Server, and Windows 11 are also affected by this vulnerability.<br \/>\nMicrosoft strongly recommends that customers running any of these versions install the<br \/>\nupdates to be fully protected from the vulnerability. Customers whose systems are<br \/>\nconfigured to receive automatic updates do not need to take any further action.<br \/>\n&#8211; Originally posted: July 13, 2021<br \/>\n&#8211; Updated: October 12, 2021<\/p>\n<p>**********************************************************<br \/>\nTitle: Microsoft Security Advisory Notification<br \/>\nIssued: October 12, 2021<br \/>\n**********************************************************<\/p>\n<p>Security Advisories Released or Updated on October 12, 2021<br \/>\n==========================================================<\/p>\n<p>* ADV200011<\/p>\n<p>ADV200011<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV200011\" target=\"_blank\" rel=\"noopener\">ADV200011<\/a> | Microsoft Guidance for Addressing Security Feature Bypass in GRUB<br \/>\n&#8211; Reason for Revision: The following revisions have been made: 1) Updated FAQ to<br \/>\nindicate that Microsoft will release an update to address this vulnerability in<br \/>\nSpring of 2022. You can register for the security notifications mailer to be alerted<br \/>\nwhen this update is available, and when content changes are made to this advisory.<br \/>\nSee\u202fMicrosoft Technical Security Notifications. 2) In the Security Updates table,<br \/>\nadded all supported editions of the following versions of Windows and Windows Server,<br \/>\nas they are affected by this vulnerability: Windows 10 version 20H2, Windows 10<br \/>\nversion 21H1, Windows 11, Windows Server, version 20H2 (Server Core Installation),<br \/>\nand Windows Server 2022. 3) In the Executive Summary, corrected location of<br \/>\nMitigations section.<br \/>\n&#8211; Originally posted: July 29, 2021<br \/>\n&#8211; Updated: October 12, 2021<br \/>\n&#8211; Version: 3.0<\/p>\n<p>**********************************************************<br \/>\nTitle: Microsoft Security Update Revisions<br \/>\nIssued: October 15, 2021<br \/>\n**********************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone revision increments.<\/p>\n<p>==========================================================<\/p>\n<p>The following CVEs have undergone a major revision increment.<\/p>\n<p>* <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-0951\" target=\"_blank\" rel=\"noopener\">CVE-2020-0951<\/a><\/p>\n<p>&#8211; CVE-2020-0951 | Windows Defender Application Control Security Feature Bypass<br \/>\nVulnerability<br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell 7.0<br \/>\nand PowerShell 7.1 because these versions of PowerShell 7 are affected by this<br \/>\nvulnerability. See <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/27\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/27<\/a> for<br \/>\nmore information.<br \/>\n&#8211; Originally posted: September 8, 2020<br \/>\n&#8211; Updated: October 14, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>* CVE-2021-41355<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-41355\" target=\"_blank\" rel=\"noopener\">CVE-2021-41355<\/a> | .NET Core and Visual Studio Information Disclosure Vulnerability<br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell 7.1<br \/>\nbecause this version of PowerShell 7 incorporates the version of .NET that<br \/>\nare affected by this vulnerability. See<br \/>\n<a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/26\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/26<\/a> for more information.<br \/>\n&#8211; Originally posted: October 12, 2021<br \/>\n&#8211; Updated: October 14, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>The following CVE has undergone informational revisions.<\/p>\n<p>* <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-41363\" target=\"_blank\" rel=\"noopener\">CVE-2021-41363<\/a><\/p>\n<p>&#8211; CVE-2021-41363 | Intune Management Extension Security Feature Bypass Vulnerability<br \/>\n&#8211; Version: 1.1<br \/>\n&#8211; Reason for Revision: The following revisions have been made: 1) In the Security<br \/>\nUpdates table, Build Number and Article link have been added. 2) FAQs have been<br \/>\nupdated to provide information about what to do to be protected from this<br \/>\nvulnerability.<br \/>\n&#8211; Originally posted: October 12, 2021<br \/>\n&#8211; Updated: October 14, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Microsoft hat im Oktober 2021 einige Security Update Releases-Benachrichtigungen und auch Revisionen publiziert. Da ich bisher nicht alles thematisieren konnte, fasse ich die betreffenden Meldungen in einem Sammelbeitrag zusammen. Die Sicherheitsinfos reichen von einer \"Windows Key Storage Provider Security Feature &hellip; <a href=\"https:\/\/borncity.com\/blog\/2021\/11\/02\/microsoft-security-update-releases-nachtrag-vom-oktober-2021\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-259023","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/259023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=259023"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/259023\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=259023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=259023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=259023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}