9VSA21-00505-01 CSIRT comparte vulnerabilidades informadas por Microsoft en su Update Tuesday de octubre
El CSIRT de Gobierno, comparte información de vulnerabilidades en productos de Microsoft, compartidas por la compañía durante su actualización mensual de octubre.
Resumen
El Equipo de Respuesta ante Incidentes de Seguridad Informática del Gobierno de Chile, CSIRT de Gobierno, comparte información de vulnerabilidades en productos de Microsoft, compartidas por la compañía durante su actualización mensual de octubre.
Este informe incluye las medidas de mitigación, consistentes en instalar la última actualización de los productos afectados.
Vulnerabilidades
CVE-2021-41346
CVE-2021-40474
CVE-2021-41345
CVE-2020-1971
CVE-2021-3449
CVE-2021-3450
CVE-2021-41361
CVE-2021-40479
CVE-2021-36953
CVE-2021-40455
CVE-2021-41347
CVE-2021-41354
CVE-2021-41352
CVE-2021-36970
CVE-2021-41363
CVE-2021-41350
CVE-2021-41348
CVE-2021-34453
CVE-2021-41355
CVE-2021-26427
CVE-2021-40457
CVE-2021-40481
CVE-2021-40480
CVE-2021-41344
CVE-2021-40484
CVE-2021-41343
CVE-2021-41342
CVE-2021-41357
CVE-2021-41353
CVE-2021-40471
CVE-2021-40472
CVE-2021-40454
CVE-2021-40485
CVE-2021-41340
CVE-2021-41339
CVE-2021-41338
CVE-2021-41337
CVE-2021-41336
CVE-2021-41335
CVE-2021-41334
CVE-2021-41332
CVE-2021-41331
CVE-2021-41330
CVE-2021-26442
CVE-2021-26441
CVE-2021-40489
CVE-2021-40488
CVE-2021-40487
CVE-2021-40486
CVE-2021-40483
CVE-2021-40482
CVE-2021-40478
CVE-2021-40477
CVE-2021-40476
CVE-2021-40475
CVE-2021-40469
CVE-2021-40470
CVE-2021-40467
CVE-2021-40466
CVE-2021-40465
CVE-2021-40468
CVE-2021-40463
CVE-2021-40464
CVE-2021-40462
CVE-2021-40460
CVE-2021-40461
CVE-2021-40456
CVE-2021-40473
CVE-2021-40449
CVE-2021-40450
CVE-2021-40443
CVE-2021-38672
CVE-2021-38663
CVE-2021-38662
Impactos
Riesgo crítico
CVE-2021-40486: Vulnerabilidad de tipo ejecución remota de código (RCE) que afecta a Microsoft Word, Office y algunas versiones de SharePoint Server y que puede ser explotada a través de Preview Pane. Requiere que un usuario abra un archivo especialmente diseñado, que puede ser enviado por email o a través de un sitio web.
CVE-2021-40461: Vulnerabilidad de tipo ejecución remota de código (RCE) que afecta a Windows Hyper-V. La vulnerabilidad permite que una máquina virtual pueda pasar de guest a host y leer memoria del kernel (nucleo).
CVE-2021-38672: Vulnerabilidad de tipo ejecución remota de código (RCE) que afecta a Windows Hyper-V. La vulnerabilidad permite que una máquina virtual pueda pasar de guest a host y leer memoria del kernel (nucleo).
Otras vunlerabilidades de riesgo importante
CVE-2021-40444: Vulnerabilidad de tipo ejecución remota de código (RCE) en MSHTML que afecta a Microsoft Windows y que está siendo explotada.
CVE-2021-40449: Vulnerabilidad de elevación de privilegios en Win32k. Está siendo explotada como parte de una campaña APT de APT IronHusky, de acuerdo con Kaspersky.
Productos Afectados
.NET 5.0
Intune management extension
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft Dynamics 365 (on-premises) version 9.0
Microsoft Dynamics 365 (on-premises) version 9.1
Microsoft Dynamics 365 Customer Engagement V9.0
Microsoft Dynamics 365 Customer Engagement V9.1
Microsoft Excel 2013 RT Service Pack 1
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft Excel 2016 (32-bit edition)
Microsoft Excel 2016 (64-bit edition)
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2016 Cumulative Update 21
Microsoft Exchange Server 2016 Cumulative Update 22
Microsoft Exchange Server 2019 Cumulative Update 10
Microsoft Exchange Server 2019 Cumulative Update 11
Microsoft Office 2013 RT Service Pack 1
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2016 (64-bit edition)
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for Mac
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Office LTSC for Mac 2021
Microsoft Office Online Server
Microsoft Office Web Apps Server 2013 Service Pack 1
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft SharePoint Server 2019
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)
Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)
Microsoft Visual Studio 2019 version 16.7 (includes 16.0 – 16.6)
Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)
Microsoft Word 2013 RT Service Pack 1
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Word 2016 (32-bit edition)
Microsoft Word 2016 (64-bit edition)
System Center 2012 R2 Operations Manager
System Center 2016 Operations Manager
System Center 2019 Operations Manager
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows 10 Version 21H1 for x64-based Systems
Windows 11 for ARM64-based Systems
Windows 11 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
Windows Server, version 20H2 (Server Core Installation)
Mitigación
Instalar las respectivas actualizaciones entregadas por el proveedor.
Enlaces
https://msrc.microsoft.com/update-guide
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40474
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40479
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41354
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36970
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40481
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41343
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41339
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41338
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41337
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41335
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40475
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40464
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40460
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38662
Informe
El informe oficial publicado por el CSIRT del Gobierno de Chile está disponible en el siguiente enlace: 9VSA21-00505-01.