{"id":260727,"date":"2021-12-18T15:02:45","date_gmt":"2021-12-18T14:02:45","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=260727"},"modified":"2021-12-19T10:43:01","modified_gmt":"2021-12-19T09:43:01","slug":"microsoft-security-update-revisions-14-15-dez-2021","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2021\/12\/18\/microsoft-security-update-revisions-14-15-dez-2021\/","title":{"rendered":"Microsoft Security Update Revisions 14.\/16. Dez. 2021"},"content":{"rendered":"<p>Microsoft hat zum 14. und 16. Dezember einige Security Update-Revisions zu Schwachstellen ver\u00f6ffentlicht. Ich stelle die betreffenden Informationen einfach als unkommentierten Nachtrag im Blog zur Information ein.<\/p>\n<p><!--more--><\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Update <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg01.met.vgwort.de\/na\/8e5b1056494748d2a4dcea41ab776284\" alt=\"\" width=\"1\" height=\"1\" \/>Revisions<br \/>\nIssued: December 14, 2021<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone revision increments.<br \/>\n====================================================================<\/p>\n<p>* CVE-2019-0887<br \/>\n* CVE-2020-0655<br \/>\n* CVE-2021-1669<br \/>\n* CVE-2021-24084<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2019-0887\" target=\"_blank\" rel=\"noopener\">CVE-2019-0887<\/a> | Remote Desktop Services Remote Code Execution Vulnerability<br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: The following revisions have been made: 1) In the Security<br \/>\nUpdates table, added Windows 11 for x64-based Systems, Windows 11 for ARM64-based<br \/>\nSystems, Windows Server 2022, and Windows Server 2022 (Server Core installation)<br \/>\nas these versions of Windows are affected by this vulnerability. Customers running<br \/>\nWindows 11 or Windows Server 2022 should install the December 2021 security updates<br \/>\nto be protected from this vulnerability. 2) Added an acknowledgement.<br \/>\n&#8211; Originally posted: July 9, 2019<br \/>\n&#8211; Updated: December 14, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-0655\" target=\"_blank\" rel=\"noopener\">CVE-2020-0655<\/a> | Remote Desktop Services Remote Code Execution Vulnerability<br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: The following revisions have been made: 1) In the Security<br \/>\nUpdates table, added Windows 11 for x64-based Systems, Windows 11 for ARM64-based<br \/>\nSystems, Windows Server 2022, and Windows Server 2022 (Server Core installation)<br \/>\nas these versions of Windows are affected by this vulnerability. Customers running<br \/>\nWindows 11 or Windows Server 2022 should install the December 2021 security updates<br \/>\nto be protected from this vulnerability. 2) Added an acknowledgement.<br \/>\n&#8211; Originally posted: February 11, 2020<br \/>\n&#8211; Updated: December 14, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-1669\" target=\"_blank\" rel=\"noopener\">CVE-2021-1669<\/a> | Windows Remote Desktop Security Feature Bypass Vulnerability<br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: The following revisions have been made: 1) In the Security<br \/>\nUpdates table, added Microsoft Remote Desktop for iOS and Microsoft Remote Desktop<br \/>\nfor Mac as these versions are affected by CVE-2021-1669. 2) New updates are available<br \/>\nthat comprehensively address this vulnerability for the following: Microsoft Remote<br \/>\nDesktop, Microsoft Remote Desktop for Android, and Remote Desktop client for Windows<br \/>\nDesktop. Customers running any of these versions of Remote Desktop should check for<br \/>\nupdates and ensure that they have the most recent update installed. Links to the<br \/>\nupdates on the respective app stores are listed in the Security Updates table.<br \/>\n&#8211; Originally posted: January 12, 2021<br \/>\n&#8211; Updated: December 14, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-24084\" target=\"_blank\" rel=\"noopener\">CVE-2021-24084<\/a> | Windows Mobile Device Management Information Disclosure Vulnerability<br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: To comprehensively address CVE-2021-24084, Microsoft has released<br \/>\nDecember 2021 security updates for all supported editions of Microsoft Windows.<br \/>\nMicrosoft strongly recommends that customers install the updates to be fully protected<br \/>\nfrom the vulnerability. Customers whose systems are configured to receive automatic<br \/>\nupdates do not need to take any further action.<br \/>\n&#8211; Originally posted: February 9, 2021<br \/>\n&#8211; Updated: December 14, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Update Revisions<br \/>\nIssued: December 16, 2021<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVE has been published to the Security Update Guide.<br \/>\n====================================================================<\/p>\n<p>* CVE-2021-44228<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">CVE-2021-44228<\/a> | Apache Log4j Remote Code Execution Vulnerability<br \/>\n&#8211; Version: 1.0<br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: December 16, 2021<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>The following CVEs have undergone revision increments.<br \/>\n======================================================================================<\/p>\n<p>* CVE-2021-43236<br \/>\n* CVE-2021-43883<br \/>\n* CVE-2021-43893<br \/>\n* CVE-2021-43905<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43236\" target=\"_blank\" rel=\"noopener\">CVE-2021-43236<\/a> | Microsoft Message Queuing Information Disclosure Vulnerability<br \/>\n&#8211; Version: 1.1<br \/>\n&#8211; Reason for Revision: Updated FAQ information. This is an informational change only.<br \/>\n&#8211; Originally posted: December 14, 2021<br \/>\n&#8211; Updated: December 16, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43883\" target=\"_blank\" rel=\"noopener\">CVE-2021-43883<\/a> | Windows Installer Elevation of Privilege Vulnerability<br \/>\n&#8211; Version: 1.1<br \/>\n&#8211; Reason for Revision: Corrected the Download and Article links in the Affected<br \/>\nProducts table. This is an informational change only.<br \/>\n&#8211; Originally posted: December 14, 2021<br \/>\n&#8211; Updated: December 16, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43893\" target=\"_blank\" rel=\"noopener\">CVE-2021-43893<\/a> | Windows Encrypting File System (EFS) Elevation of Privilege<br \/>\nVulnerability<br \/>\n&#8211; Version: 1.1<br \/>\n&#8211; Reason for Revision: Corrected Article and Download entries in the Affected<br \/>\nProducts table. This is an informational change only.<br \/>\n&#8211; Originally posted: December 14, 2021<br \/>\n&#8211; Updated: December 16, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43905\" target=\"_blank\" rel=\"noopener\">CVE-2021-43905<\/a> | Microsoft Office app Remote Code Execution Vulnerability<br \/>\n&#8211; Version: 1.1<br \/>\n&#8211; Reason for Revision: Added an FAQ to indicate the app version that contains<br \/>\nthe update.<br \/>\n&#8211; Originally posted: December 14, 2021<br \/>\n&#8211; Updated: December 16, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: Critical<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft hat zum 14. und 16. Dezember einige Security Update-Revisions zu Schwachstellen ver\u00f6ffentlicht. Ich stelle die betreffenden Informationen einfach als unkommentierten Nachtrag im Blog zur Information ein.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-260727","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/260727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=260727"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/260727\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=260727"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=260727"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=260727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}