近日,腾讯云安全运营中心监测到,微软发布了2021年8月的例行安全更新公告,共涉及漏洞数44个,其中严重级别漏洞7个,重要级别37个。本次发布涉及Windows操作系统,Office,Windows Defender,Visual Studio,. NET,Edge等多个软件的安全更新。
为避免您的业务受影响,腾讯云安全建议您及时开展安全自查,如在受影响范围,请您及时进行更新修复,避免被外部攻击者入侵。
漏洞详情
在此次公告中以下漏洞需要重点关注:
CVE-2021-36948(Windows Update Medic Service特权提升漏洞):
该漏洞允许通过 Windows Update Medic 服务进行本地权限提升,这是 Windows 10 中引入的一项新功能,旨在修复损坏的 Windows 更新组件,以便计算机可以继续接收更新。攻击者需要登录受影响的系统并运行特制的程序来提升权限。
漏洞CVSS分数7.8。该漏洞微软已检测到有在野利用,请优先修补。
CVE-2021-34535(Remote Desktop Client远程代码执行漏洞):
该漏洞影响 RDP 客户端并非 RDP 服务器。当攻击者可以使受影响的 RDP 客户端连接到特制的 RDP 服务器时,则有可能控制该机器。
漏洞CVSS分数9.9,被微软标记为严重漏洞,需要重点关注。
CVE-2021-36942(Windows LSA 欺骗漏洞):
未经身份验证的攻击者可以调用 LSARPC 接口上的方法并强制域控制器使用 NTLM 对另一台服务器进行身份验证。恶意用户可以使用此漏洞完全控制windows域。
漏洞CVSS分数9.8。
CVE-2021-36936(Windows Print Spooler 远程代码执行漏洞):
漏洞CVSS分数8.8,此漏洞被微软标记为公开已知,尚未说明是否为PrintNightmare的变种。
CVE-2021-26424(Windows TCP/IP远程代码执行漏洞):
攻击者可以利用 TCP/IP 协议栈 (tcpip.sys) 向其主机发送特制的 TCP/IP 数据包来处理数据包。可由恶意 Hyper-V 来宾向 Hyper-V 主机发送 ipv6 ping 远程触发。
漏洞CVSS分数9.9,被微软标记为严重漏洞。
风险等级
影响版本
CVE-2021-36948:
Windows Server, version 20H2 (Server Core Installation)
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for x64-based Systems
Windows Server, version 2004 (Server Core installation)
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
CVE-2021-34535:
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Remote Desktop client for Windows Desktop
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows Server 2019
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows Server 2012
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows RT 8.1
Windows 8.1 for x64-based systems
Windows 8.1 for x64-based systems
Windows 8.1 for 32-bit systems
Windows 8.1 for 32-bit systems
Windows 7 for x64-based Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2012 R2
Windows Server 2012 R2
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
及其他此次补丁更新日期前的所有相关软件版本
其他漏洞影响的组件可详细参考官方公告
修复建议
微软官方已发布漏洞修复更新,腾讯云安全建议您:
1)更新系统补丁:确保服务器打上了所需的补丁,打开Windows Update更新功能或下载修复补丁,点击“检查更新”
2)不要打开来历不明的文件或者链接:避免被攻击者利用在机器上执行恶意代码。
【备注】:建议您在安装补丁前做好数据备份工作,避免出现意外
漏洞参考
官方安全公告:
https://msrc.microsoft.com/update-guide/releaseNote/2021-Aug
本文作者:云鼎实验室
本文为安全脉搏专栏作者发布,转载请注明:https://www.secpulse.com/archives/164327.html