A fresh and alarming attack vector has emerged, targeting a longstanding vulnerability within Active Directory networks. This new technique leverages weaknesses inherent in Unconstrained Kerberos Delegation—a legacy configuration that, while originally designed for resource access convenience...
Every day, the Microsoft Security Response Center (MSRC) receives vulnerability reports from security researchers, technology/industry partners, and customers. We want those reports, because they help us make our products and services more secure. High-quality reports that include proof of...
Original release date: October 03, 2018
Systems Affected
Network Systems
Overview
The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed service providers (MSPs). Since May 2016...
Original release date: September 06, 2016 | Last revised: September 28, 2016
Systems Affected
Network Infrastructure Devices
Overview
The advancing capabilities of organized hacker groups and cyber adversaries create an increasing global threat to information systems. The rising threat...
Original release date: April 27, 2017
Systems Affected
Networked Systems
Overview
The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurring since at least May 2016, that uses multiple malware implants. Initial...
Severity Rating: Critical
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
administrative access
attackvector
critical severity
cumulative update
data security
exploit
extended security updates
internet explorer
malware prevention
ms16-104
patch
remote code execution
risk mitigation
security bulletin
september
system control
update bulletin
user account
user rights
vulnerabilities
Severity Rating: Critical
Revision Note: V1.0 (January 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet...
administrative
attackvector
critical
cumulative update
cybersecurity
data security
exploit
extended security updates
internet explorer
malware
microsoft
ms16-001
patch management
remote code execution
revision note
security
user rights
vulnerability
webpage
Severity Rating: Important
Revision Note: V1.0 (July 14, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if the Windows graphics component fails to properly process bitmap conversions. An...
Original release date: April 29, 2015
Systems Affected
Systems running unpatched software from Adobe, Microsoft, Oracle, or OpenSSL.
Overview
Cyber threat actors continue to exploit unpatched software to conduct attacks against critical infrastructure organizations. As many as 85 percent of...
Severity Rating: Critical
Revision Note: V1.0 (November 11, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability could allow remote code execution if an...
Revision Note: V1.0 (October 14, 2014): Advisory published
Summary: Microsoft is aware of detailed information that has been published describing a new method to exploit a vulnerability in SSL 3.0, affecting the Windows operating system. This vulnerability affects the protocol itself and is not...
Revision Note: V1.0 (October 14, 2014): Advisory published
Summary: Microsoft is aware of detailed information that has been published describing a new method to exploit a vulnerability in SSL 3.0, affecting the Windows operating system. This vulnerability affects the protocol itself and is not...
Severity Rating:
Revision Note: V18.0 November 13, 2012): Added the following Microsoft Security Bulletin to the Updates relating to Insecure Library Loading section: MS12-074, "Vulnerabilities in .NET Framework Could Allow Remote Code Execution."
Summary: Microsoft is aware that research has...
Original release date: February 20, 2013
Systems Affected
Any system using Oracle Java including
JDK and JRE 7 Update 13 and earlier
JDK and JRE 6 Update 39 and earlier
JDK and JRE 5.0 Update 39 and earlier
SDK and JRE 1.4.2_41 and earlier
Web browsers using the Java plug-in are at...
Original release date: February 01, 2013 | Last revised: February 06, 2013
Systems Affected
Any system using Oracle Java including
JDK and JRE 7 Update 11 and earlier
JDK and JRE 6 Update 38 and earlier
JDK and JRE 5.0 Update 38 and earlier
SDK and JRE 1.4.2_40 and earlier
JavaFX...
Severity Rating: Critical
Revision Note: V1.1 (January 8, 2013): Corrected download links for Microsoft XML Core Services 3.0 on Windows Server 2003 with SP2 for Itanium-based Systems and for Microsoft XML Core Services 6.0 when installed on Windows Server 2003 with SP2 for...
affected software
attackvector
critical update
email threats
execution
extended security updates
informational change
internet explorer
ms11-003
remote code execution
revision note
security
server core
service pack
update
users
vulnerabilities
windows server
xml
Severity Rating: Critical
Revision Note: V1.0 (November 13, 2012): Bulletin published.
Summary: This security update resolves two privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user browses to a specially...
Severity Rating: Critical
Revision Note: V1.0 (July 10, 2012): Bulletin published.
Summary: This security update resolves a publicly disclosed vulnerability in Microsoft XML Core Services. The vulnerability could allow remote code execution if a user views a specially...
Revision Note: V15.0 (March 13, 2012): Added the following Microsoft Security Bulletin to the Updates relating to Insecure Library Loading section: MS12-022, "Vulnerability in Expression Design Could Allow Remote Code Execution."
Summary: Microsoft is aware that research has been...
Resolves vulnerabilities in Windows Task Scheduler that could allow elevation of privilege if an attacker logged on to an affected system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on...
More...
attackvector
elevation of privilege
logon credentials
security patch
system administration
task scheduler
threat mitigation
vulnerability
windows security
windows update