{"id":21948,"date":"2021-11-02T16:07:54","date_gmt":"2021-11-02T15:07:54","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=21948"},"modified":"2021-11-02T16:07:54","modified_gmt":"2021-11-02T15:07:54","slug":"microsoft-security-update-releases-nachtrag-vom-oktober-2021","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/11\/02\/microsoft-security-update-releases-nachtrag-vom-oktober-2021\/","title":{"rendered":"Microsoft Security Update Releases &#8211; October 2021"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/11\/02\/microsoft-security-update-releases-nachtrag-vom-oktober-2021\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Microsoft has published some Security Update Releases notifications and also revisions in October 2021. Since I have not been able to cover everything so far, I am summarizing the relevant notifications in a collective post. The security information ranges from a \"Windows Key Storage Provider Security Feature Bypass Vulnerability\" to the Azure AD Security Feature Bypass Vulnerability.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg08.met.vgwort.de\/na\/38d323b2fa43424081cc81474af6b2dc\" width=\"1\" height=\"1\">**********************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: October 12, 2021<br \/>**********************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2021-38624<br \/>* CVE-2021-33781<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-38624\" target=\"_blank\" rel=\"noopener\">CVE-2021-38624<\/a><\/p>\n<p>&#8211; Windows Key Storage Provider Security Feature Bypass Vulnerability<br \/>&#8211; Version 2.0<br \/>&#8211; Reason for Revision: The following revisions have been made: 1) To comprehensively <br \/>&nbsp;&nbsp; address CVE-2021-38624, Microsoft has released the October 2021 Security Updates <br \/>&nbsp;&nbsp; for all affected editions of Windows 10 Version 1809 and newer because these versions<br \/>&nbsp;&nbsp; are also affected by CVE-2021-38624. 2) In the Security Updates table, Windows 11 for<br \/>&nbsp;&nbsp; x64-based systems and Windows 11 for ARM64-based systems have been added as Windows 11<br \/>&nbsp;&nbsp; is also affected by this vulnerability. Microsoft strongly recommends that customers <br \/>&nbsp;&nbsp; install the October updates to be fully protected from this vulnerability. Customers <br \/>&nbsp;&nbsp; whose systems are configured to receive automatic updates do not need to take any <br \/>&nbsp;&nbsp; further action.<br \/>&#8211; Originally posted: September 14, 2021<br \/>&#8211; Updated: October 12, 2021<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-33781\" target=\"_blank\" rel=\"noopener\">CVE-2021-33781<\/a><\/p>\n<p>&#8211; Azure AD Security Feature Bypass Vulnerability<br \/>&#8211; Version 2.0<br \/>&#8211; Reason for Revision: In the Security Updates table, added all supported versions<br \/>&nbsp;&nbsp; of Windows 10 Version 1607, Windows Server 2016, and Windows 11 because these versions<br \/>&nbsp;&nbsp; of Windows 10, Windows Server, and Windows 11 are also affected by this vulnerability.<br \/>&nbsp;&nbsp; Microsoft strongly recommends that customers running any of these versions install the<br \/>&nbsp;&nbsp; updates to be fully protected from the vulnerability. Customers whose systems are<br \/>&nbsp;&nbsp; configured to receive automatic updates do not need to take any further action.<br \/>&#8211; Originally posted: July 13, 2021<br \/>&#8211; Updated: October 12, 2021<\/p>\n<p>**********************************************************<br \/>Title: Microsoft Security Advisory Notification<br \/>Issued: October 12, 2021<br \/>**********************************************************<\/p>\n<p>Security Advisories Released or Updated on October 12, 2021<br \/>==========================================================<\/p>\n<p>* ADV200011<\/p>\n<p>ADV200011<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV200011\" target=\"_blank\" rel=\"noopener\">ADV200011<\/a> | Microsoft Guidance for Addressing Security Feature Bypass in GRUB<br \/>&#8211; Reason for Revision: The following revisions have been made: 1) Updated FAQ to<br \/>&nbsp;&nbsp; indicate that Microsoft will release an update to address this vulnerability in <br \/>&nbsp;&nbsp; Spring of 2022. You can register for the security notifications mailer to be alerted<br \/>&nbsp;&nbsp; when this update is available, and when content changes are made to this advisory.<br \/>&nbsp;&nbsp; See\u202fMicrosoft Technical Security Notifications. 2) In the Security Updates table,<br \/>&nbsp;&nbsp; added all supported editions of the following versions of Windows and Windows Server,<br \/>&nbsp;&nbsp; as they are affected by this vulnerability: Windows 10 version 20H2, Windows 10 <br \/>&nbsp;&nbsp; version 21H1, Windows 11, Windows Server, version 20H2 (Server Core Installation),<br \/>&nbsp;&nbsp; and Windows Server 2022. 3) In the Executive Summary, corrected location of <br \/>&nbsp;&nbsp; Mitigations section.<br \/>&#8211; Originally posted: July 29, 2021<br \/>&#8211; Updated: October 12, 2021<br \/>&#8211; Version: 3.0<\/p>\n<p>**********************************************************<br \/>Title: Microsoft Security Update Revisions<br \/>Issued: October 15, 2021<br \/>**********************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone revision increments.<\/p>\n<p>==========================================================<\/p>\n<p>The following CVEs have undergone a major revision increment.<\/p>\n<p>* <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-0951\" target=\"_blank\" rel=\"noopener\">CVE-2020-0951<\/a><\/p>\n<p>&#8211; CVE-2020-0951 | Windows Defender Application Control Security Feature Bypass<br \/>&nbsp;&nbsp; Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell 7.0 <br \/>&nbsp;&nbsp; and PowerShell 7.1 because these versions of PowerShell 7 are affected by this<br \/>&nbsp;&nbsp; vulnerability. See <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/27\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/27<\/a> for <br \/>&nbsp;&nbsp; more information.<br \/>&#8211; Originally posted: September 8, 2020<br \/>&#8211; Updated: October 14, 2021<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>* CVE-2021-41355<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-41355\" target=\"_blank\" rel=\"noopener\">CVE-2021-41355<\/a> | .NET Core and Visual Studio Information Disclosure Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell 7.1 <br \/>&nbsp;&nbsp; because this version of PowerShell 7 incorporates the version of .NET that<br \/>&nbsp;&nbsp; are affected by this vulnerability. See<br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/26\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/26<\/a> for more information. <br \/>&#8211; Originally posted: October 12, 2021<br \/>&#8211; Updated: October 14, 2021<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>The following CVE has undergone informational revisions.<\/p>\n<p>* <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-41363\" target=\"_blank\" rel=\"noopener\">CVE-2021-41363<\/a><\/p>\n<p>&#8211; CVE-2021-41363 | Intune Management Extension Security Feature Bypass Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Reason for Revision: The following revisions have been made: 1) In the Security <br \/>&nbsp;&nbsp; Updates table, Build Number and Article link have been added. 2) FAQs have been<br \/>&nbsp;&nbsp; updated to provide information about what to do to be protected from this <br \/>&nbsp;&nbsp; vulnerability.<br \/>&#8211; Originally posted: October 12, 2021<br \/>&#8211; Updated: October 14, 2021<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft has published some Security Update Releases notifications and also revisions in October 2021. Since I have not been able to cover everything so far, I am summarizing the relevant notifications in a collective post. The security information ranges from &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/11\/02\/microsoft-security-update-releases-nachtrag-vom-oktober-2021\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-21948","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=21948"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21948\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=21948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=21948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=21948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}