Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 59 vulnerabilities that were fixed in 13 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 13 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
This security update contains the following:
MacOS Release Notes
Office Click-2-Run and Office 365 Release Notes
KB5001999
KB4484103
KB5002005
KB5001997
KB4484108
KB5002007
KB5001958
KB5002003
KB5002014
KB5002009
KB5002014
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on the affected office system.
Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.
MacOS Release Notes
Office Click-2-Run and Office 365 Release Notes
KB5001999
KB4484103
KB5002005
KB5001997
KB4484108
KB5002007
KB5001958
KB5002003
KB5002014
KB5002009
KB5002014
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update September 2021
This security update contains the following KBs:
QID Detection Logic:
This authenticated QID checks the file versions from the above Microsoft KB article with the versions on the affected SharePoint system.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update September 2021
Affected Versions:
Visual studio code prior to version 1.59.1
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of Visual Studio Code.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-26437
CVE-2021-38649: Open Management Infrastructure Elevation of Privilege Vulnerability
CVE-2021-38648: Open Management Infrastructure Elevation of Privilege Vulnerability
CVE-2021-38647: Open Management Infrastructure Remote Code Execution Vulnerability
CVE-2021-38645: Open Management Infrastructure Elevation of Privilege Vulnerability
Affected Software:
Azure Open Management Infrastructure prior to v1.6.8-1
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-38645
CVE-2021-38647
CVE-2021-38648
CVE-2021-38649
CVE-2021-38669 Microsoft Edge (Chromium-based)
Affected Versions:
Microsoft Edge Based On Chromium versions before 93.0.961.47
QID Detection Logic: (authenticated)
Operating System: Windows
The install path is checked via registry "HKLM\SOFTWARE\Clients\StartMenuInternet\Microsoft Edge\shell\open\command". The version is checked via file msedge.exe.
Operating System: MacOS
The QID checks for the version of Microsoft Edge Based On Chromium app.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Edge (chromium based) 93.0.961.47
QID Detection Logic:
The QID checks if Active X controls are disabled in registry hive HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Microsoft has released security Updates for Visual Studio which resolves Remote Code Execution and Elevation of Privilege vulnerability.
Affected Software:
Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8)
Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 - 16.6)
Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
QID Detection Logic: Authenticated
This QID detects vulnerable versions of Microsoft Visual Studio by checking the file version of the Visual Studio.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-26434
CVE-2021-36952
The KB Articles associated with the update:
KB5005613
KB5005627
KB5005623
KB5005607
KB5005633
KB5005615
KB5005606
KB5005618
KB5005573
KB5005569
KB5005565
KB5005566
KB5005568
This QID checks for the file version of ntoskrnl.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB5005613-6.3.9600.20111
KB5005627-6.3.9600.20111
KB5005633-6.1.7601.25704
KB5005615-6.1.7601.25704
KB5005606-6.0.6003.21213
KB5005618-6.0.6003.21213
KB5005623-6.2.9200.23459
KB5005607-6.2.9200.23459
KB5005573-10.0.14393.4651
KB5005569-10.0.10240.19060
KB5005565-10.0.19041.1237
KB5005566-10.0.18362.1801
KB5005568-10.0.17763.2183
KB5005575-10.0.20348.230
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5005565
KB5005566
KB5005568
KB5005569
KB5005573
KB5005606
KB5005607
KB5005613
KB5005615
KB5005618
KB5005623
KB5005627
KB5005633
CVE-2021-40440:Microsoft Dynamics Business Central Cross-site Scripting Vulnerability.
Affected Software:
Microsoft Dynamics 365 Business Central 2021 Release Wave 1 - Update 18.5
Microsoft Dynamics 365 Business Central 2020 Release Wave 2 - Update 17.10.
QID Detection Logic(Authenticated):
This authenticated QID flags vulnerable systems by detecting Vulnerable versions for file Microsoft.Dynamics.Nav.Server.exe
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-40440
The KB Articles associated with the update:
KB5005606
KB5005618
This QID checks for the file version of ntoskrnl.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB5005606
KB5005618
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5005606
KB5005618
Affected Product:
"HEVC from Device Manufacturer" media codec before version 1.0.42091.0
QID detection Logic:
The gets the version of HEVCVideoExtension by querying wmi class Win32_InstalledStoreProgram.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-38661
Affected Product:
MPEG-2 Video Extension before version 1.0.42152.0
QID detection Logic:
The gets the version of HMPEG2VideoExtension by querying wmi class Win32_InstalledStoreProgram.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-38644
Microsoft has rated this update as Critical for IE9, IE11
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5005563
These new vulnerability checks are included in Qualys vulnerability signature 2.5.279-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.