![]() Alternately, the attacker could also mess with the victimized users’ privileges and use them to launch a wider attack on Adobe’s servers. ![]() If an attacker were to access these weak spots, they could wreak havoc on the user’s system by executing arbitrary code which could in turn allow the attacker further access to the victim’s computer, even allowing them to plant dangerous malware in the system or leak important files from the targeted hard drive. Listed below are the Microsoft programs and platforms in which CERT-In found these vulnerabilities:Īccording to CERT-In, there are nine major vulnerable chinks in across six of their most popular applications. Microsoft Office and Office 365, which consist of daily usage programs such as Word and Excel, was also reported for having five “high” vulnerabilities between the two of them that could let an attacker execute harmful code that could take over an entire system or disclose sensitive information from a document or spreadsheet without the user’s knowledge. The chinks and bugs in Microsoft products’ armours also extend to the company’s other popular applications and platforms including the 28 bugs found in the widely popular Azure cloud computing infrastructure, which is used by hundreds of application developers to host their product as it supports dozens of different programming languages, tools, and frameworks. According to the Microsoft security team’s notes, most of these OS vulnerabilities were traced back to the Windows Server 20, both of which are used by Windows 10 and 11. Among these, 36 vulnerabilities were reported in the Windows operating systems including Windows 7, 8.1, 10 and 11. ![]() “Multiple vulnerabilities have been reported in various Microsoft products, which could be exploited by an attacker to access sensitive information, bypass security restrictions, perform a denial of service (DoS) attack, escalating privileges and perform spoofing attacks or executing arbitrary codes on the target system,” CERT-In said on its vulnerability notes blog.ĬERT-In has flagged 90 sensitive bugs in various Microsoft products on June 16. What are the vulnerabilities in Microsoft products? The fact that CERT-In has flagged these bugs in software used widely around the country should prompt a deeper look into other popular applications, browsers and OSs as well. Some of the more common patterns in attacks all over the world include the exploitation of vulnerabilities in commonly used creative applications, web browsers and operating systems. Why it matters: Cyber-attacks have been on the rise since the pandemic started with the Ministry of Home Affairs reporting 12 lakh cyber security incidents in 2020 alone. Interestingly, Adobe, the publisher of creative software such as Photoshop and Premier Pro, has also been flagged by the Indian cybersecurity watchdog as having equally severe vulnerabilities as the Microsoft products on the same day (June 16) particularly in creative suite applications inDesign and Illustrator, but according to its security patch notes, Adobe has yet to complete patching all the vulnerabilities described by CERT. Microsoft has patched these vulnerabilities since then with two updates, one on June 17 and the other on June 20. June has turned out to be an eventful month for Microsoft’s security patching team as India’s Computer Emergency Response (CERT-In) brought the Albuquerque-based multinational technology corporation up to task twice in the same month for vulnerabilities across multiple platforms including the new flag ship Windows 11 operating system (OS) and its Edge browser.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |