Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 43 vulnerabilities that were fixed in 12 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 12 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update contains the following KBs:
KB5002063
QID Detection Logic:
This authenticated QID checks the file versions from the above Microsoft KB article with the versions on the affected SharePoint system.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update November 2021
This security update contains the following:
MacOS Release Notes
Office Click-2-Run and Office 365 Release Notes
5002072
5002035
5002056
4486670
5002038
5002032
5002053
5002065
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on the affected office system.
Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.
MacOS Release Notes
Office Click-2-Run and Office 365 Release Notes
5002072
5002035
5002056
4486670
5002038
5002032
5002053
5002065
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update November 2021
Affected Versions:
Visual studio code prior to version 1.62.1
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of Visual Studio Code.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-42322
Affected Versions:
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 10
Microsoft Exchange Server 2019 Cumulative Update 11
Microsoft Exchange Server 2016 Cumulative Update 21
Microsoft Exchange Server 2016 Cumulative Update 22
QID Detection Logic (authenticated):
The QID checks for the version of file Exsetup.exe.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5007409
Affected Versions:
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 10
Microsoft Exchange Server 2019 Cumulative Update 11
Microsoft Exchange Server 2016 Cumulative Update 21
Microsoft Exchange Server 2016 Cumulative Update 22
QID Detection Logic (authenticated):
The QID checks for the version of file Exsetup.exe.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5007409
Microsoft has released a security Update for Visual Studio which resolves Elevation of privilege and Remote Code Execution Vulnerabilities.
Affected Software:
Microsoft Visual Studio 2019 version 16.11 (includes 16.0-16.10)
Microsoft Visual Studio 2019 version 16.9 (includes 16.0-16.8)
Microsoft Visual Studio 2019 version 16.7 (includes 16.0-16.6)
Microsoft Visual Studio 2017 version 15.9 (includes 15.0-15.8)
and Microsoft Visual Studio 2015 Update 3
The vulnerable versions of Visual Studio let attackers to perform Elevation of privilege and Remote Code Execution Attacks.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-3711
CVE-2021-42277
CVE-2021-42319
KB5007275
The KB Articles associated with the update:
KB5007192
KB5007207
KB5007206
KB5007186
KB5007189
KB5007205
KB5007215
KB5007247
KB5007255
KB5007260
KB5007245
KB5007236
KB5007233
KB5007263
KB5007246
This QID checks for the file version of ntoskrnl.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB5007192 -10.0.14393.4770
KB5007207- 10.0.10240.19119
KB5007206-10.0.17763.2300
KB5007186-10.0.19041.1348
KB5007189-10.0.18362.1916
KB5007205-10.0.20348.350
KB5007215-10.0.22000.318
KB5007247-6.3.9600.20173
KB5007255-6.3.9600.20173
KB5007260-6.2.9200.23516
KB5007245-6.2.9200.23516
KB5007236-6.1.7601.25767
KB5007233-6.1.7601.25767
KB5007263-6.0.6003.21280
KB5007246-6.0.6003.21280
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5007186
KB5007189
KB5007192
KB5007205
KB5007206
KB5007207
KB5007215
KB5007233
KB5007236
KB5007245
KB5007246
KB5007247
KB5007255
KB5007260
KB5007263
CVE-2021-42316:Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability
Affected Software:
Microsoft Dynamics 365(on-premise) version 9.0
Microsoft Dynamics 365(on-premise) version 9.1
QID Detection Logic(Authenticated):
This authenticated QID flags vulnerable systems by detecting Vulnerable versions for file Microsoft.Crm.Setup.Server.exe:
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-42316
Affected Versions:
Microsoft 3D-Viewer App package versions prior to 7.2107.7012.0
QID Detection Logic (Authenticated):
The detection gets the version of Microsoft.Microsoft3DViewer by querying wmi class Win32_InstalledStoreProgram.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-43208
CVE-2021-43209
The KB Articles associated with the update:
KB5007192
KB5007206
KB5007186
KB5007205
KB5007247
KB5007255
KB5007260
KB5007245
KB5007236
KB5007233
KB5007263
KB5007246
This QID checks for the file version of ntoskrnl.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB5007192 -10.0.14393.4770
KB5007206-10.0.17763.2300
KB5007186-10.0.19041.1348
KB5007205-10.0.20348.350
KB5007247-6.3.9600.20173
KB5007255-6.3.9600.20173
KB5007260-6.2.9200.23516
KB5007245-6.2.9200.23516
KB5007236-6.1.7601.25767
KB5007233-6.1.7601.25767
KB5007263-6.0.6003.21280
KB5007246-6.0.6003.21280
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5007186
KB5007192
KB5007205
KB5007206
KB5007233
KB5007236
KB5007245
KB5007246
KB5007247
KB5007255
KB5007260
KB5007263
Affected Software:
Windows Defender
QID Detection Logic (Authenticated):
Detection checks for mpengine.dll file version less than 1.1.18700.3
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-42298
Affected Versions:
Power BI Report Server (September 2021)
QID Detection Logic:
This authenticated QID detects vulnerable versions of RSHostingService.exe by fetching the service installed path from the HKLM\SYSTEM\CurrentControlSet\Services\PowerBIReportServer registry key.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-41372
These new vulnerability checks are included in Qualys vulnerability signature 2.5.326-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.