Microsoft has launched its common replace on the second Tuesday of every month (Patch Tuesday), and with it they’ve fixed 44 vulnerabilities, seven of which have been labeled as crucial, three have been zero days, and 37 have been vital.
Maybe the spotlight right here is that lastly PrintNightmare has a definitive patch. Keep in mind that it’s a vulnerability within the spooling system that impacts all variations of Home windows and that permits an attacker to remotely execute code on the system with elevated privileges.
PrintNightmare was found in late June and Microsoft started investigating the issue nearly instantly. Nonetheless, not solely did they take a very long time to ship a patch, however its launch and effectiveness have been fairly bumpy. With the Patch Tuesday August, it has lastly been fastened appropriately.
WINDOWS 10: 9 VERY USEFUL and LITTLE KNOWN TRICKS
Mounted bug in Home windows 10 and Home windows 11 that means that you can achieve full entry to the system with out having to crack the passwords
One other vital vulnerability that’s fastened with this patch is the vulnerability associated to Safety Account Supervisor (SAM), an issue that permits any person to entry Home windows Registry recordsdata and databases with out the necessity for elevated privileges.
This bug was found in mid-July, and impacts all supported variations of Home windows 10. The “good” information is that not less than Microsoft has not detected that the flaw was being actively exploited.
Nonetheless, among the many zero day vulnerabilities listed within the replace is a “Home windows Replace Medical Service Elevation of Privilege Vulnerability” (CVE-2021-36948 ), and Microsoft signifies that it was being exploited. The element is that they don’t clarify how, or since when, or the place it was being exploited.