Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 51 vulnerabilities that were fixed in 11 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 11 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
Microsoft has released Cumulative Security Updates for Internet Explorer which addresses various vulnerabilities found in Internet Explorer 11 (IE 11) and IE9.
KB Articles associated with the Update:
KB5003209
KB5003165
KB5003208
KB5003233
KB5003197
KB5003172
KB5003173
KB5003169
KB5003171
KB5003174
QID Detection Logic (Authenticated):
This QID checks for the file version of %windir%\System32\mshtml.dll
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-26419
This security update contains the following KBs:
KB5001935
KB5001916
KB5001917
QID Detection Logic:
This authenticated QID checks the file versions from the above Microsoft KB article with the versions on the affected SharePoint system.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update May 2021
This security update contains the following KBs:
KB5001931
KB4464542
KB5001919
KB5001928
KB5001927
KB5001936
KB5001923
KB5001918
KB5001914
KB5001925
KB5001920
KB4493206
KB4493197
QID Detection Logic:
This authenticated QID checks the file versions from the Microsoft advisory with the versions on the affected office system.
Note: Office click-2-run and Office 365 installations need to be updated manually or need to be set to automatic update. There is no direct download for the patch.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Office and Microsoft Office Services and Web Apps Security Update May 2021
Affected Software:
Microsoft Lync Server 2013
Skype for Business Server 2015
Microsoft Skype for Business Server 2019
QID Detection Logic:
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Update Guidance
Affected Versions:
Containers Extension for Visual Studio Code prior to version 0.177.2
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of Containers Extension for Visual Studio Code.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-31213 Windows
Affected Versions:
Visual studio code prior to version 1.56.1
QID Detection Logic(Authenticated):
This QID checks for the vulnerable versions of visual studio code.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-31214 MAC OS X
CVE-2021-31214 Windows
Microsoft Exchange Server Spoofing Vulnerability
Microsoft Exchange Server Security Feature Bypass Vulnerability
Microsoft Exchange Server Remote Code Execution Vulnerability
KB Articles associated with this update are: KB5003435
Affected Versions:
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2016 Cumulative Update 19
Microsoft Exchange Server 2016 Cumulative Update 20
Microsoft Exchange Server 2019 Cumulative Update 8
Microsoft Exchange Server 2019 Cumulative Update 9
QID Detection Logic (authenticated):
The QID checks for the version of file Exsetup.exe.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
KB5003435
The KB Articles associated with the update:
KB5003169
KB5003171
KB5003172
KB5003174
KB5003197
KB5003203
KB5003208
KB5003209
KB5003210
KB5003220
KB5003225
KB5003228
KB5003233
This QID checks for the file version of ntoskrnl.exe
The following versions of ntoskrnl.exe with their corresponding KBs are verified:
KB5003169 - 10.0.18362.1533
KB5003171 - 10.0.17763.1935
KB5003172 - 10.0.10240.18932
KB5003174 - 10.0.17134.2208
KB5003197 - 10.0.14393.4402
KB5003203 - 6.2.9200.23347
KB5003208 - 6.2.9200.23347
KB5003209 - 6.3.9600.20012
KB5003210 - 6.0.6003.21115
KB5003220 - 6.3.9600.20012
KB5003225 - 6.0.6003.21115
KB5003228 - 6.1.7601.24596
KB5003233 - 6.1.7601.24596
Patches:
The following are links for downloading patches to fix these vulnerabilities:
Microsoft Security Update Guide WIndows
Affected Software:
Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 - 16.6)
Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)
QID Detection Logic:Authenticated
This QID detects vulnerable versions of Microsoft Visual Studio by checking file version of devenv.exe.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-27068 WIndows
QID detection Logic:
The gets the version of Extension by querying wmi class Win32_InstalledStoreProgram.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-28465 WIndows
Affected versions:
.NET 5.0 and .NET Core 3.1
QID Detection Logic (Authenticated):
The qid looks for sub directories under %programfiles%\dotnet\shared\Microsoft.NETCore.App, %programfiles(x86)%\dotnet\shared\Microsoft.NETCore.App and checks for vulnerable versions in .version file on Windows.
NOTE: This QID is Deprecated. This QID will retire on 06/21/2021.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
CVE-2021-31204 WIndows
These new vulnerability checks are included in Qualys vulnerability signature 2.5.182-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.