Detection and Response

Patch Tuesday - February 2021

|Last updated on Feb 9, 2021|1 min read
LinkedInFacebookX
Patch Tuesday - February 2021

The second Patch Tuesday of 2021 is relatively light on the vulnerability count, with 64 CVEs being addressed across the majority of Microsoft’s product families. Despite that, there’s still plenty to discuss this month.

Vulnerability Breakdown by Software Family

FamilyVulnerability Count
Windows28
ESU14
Microsoft Office11
Browser9
Developer Tools8
Microsoft Dynamics2
Exchange Server2
Azure2
System Center2

Exploited and Publicly Disclosed Vulnerabilities

One zero-day was announced: CVE-2021-1732 is a privilege elevation vulnerability affecting the Win32k component of Windows 10 and Windows Server 2019, reported to be exploited in the wild. Four vulnerabilities have been previously disclosed: CVE-2021-1727, a privilege elevation vulnerability in Windows Installer, affecting all supported versions of Windows; CVE-2021-24098, which is a denial of service (DoS) affecting Windows 10 and Server 2019; CVE-2021-24106, an information disclosure vulnerability affecting DirectX in Windows 10 and Server 2019; and CVE-2021-26701, an RCE in .NET Core.

Vulnerabilities in Windows TCP/IP

Microsoft also disclosed a set of three serious vulnerabilities affecting the TCP/IP networking stack in all supported versions of Windows. Two of these (CVE-2021-24074 and CVE-2021-24094) carry a base CVSSv3 score of 9.8 and could allow Remote Code Execution (RCE). CVE-2021-24094 is specific to IPv6 link-local addresses, meaning it isn’t exploitable over the public internet. CVE-2021-24074, however, does not have this limitation. The third, CVE-2021-24086, is a DoS vulnerability that could allow an attacker to trigger a “blue screen of death” on any Windows system that is directly exposed to the internet, using only a small amount of network traffic. The RCE exploits are probably not a threat in the short term, due to the complexity of the vulnerabilities, but DoS attacks are expected to be seen much more quickly. Windows systems should be patched as soon as possible to protect against these.

In the event a patch cannot be applied immediately, such as on systems that cannot be rebooted, Microsoft has published mitigation guidance that will protect against exploitation of the TCP/IP vulnerabilities. Depending on the exposure of an asset, IPv4 Source Routing should be disabled via a Group Policy or a Netsh command, and IPv6 packet reassembly should be disabled via a separate Netsh command. IPv4 Source Routing requests and IPv6 fragments can also be blocked load balancers, firewalls, or other edge devices to mitigate these issues.

Zerologon Update

Back in August, 2020, Microsoft addressed a critical remote code vulnerability (CVE-2020-1472) affecting the Netlogon protocol (MS-NRPC), a.k.a. “Zerologon”. In October, Microsoft noted that attacks which exploit this weakness have been seen in the wild. On January 14, 2021, they reminded organizations that the February 2021 security update bundle will also be enabling “Domain Controller enforcement mode" by default to fully address this weakness. Any system that tries to make an insecure Netlogon connection will be denied access. Any business-critical process that relies on these insecure connections will cease to function. Rapid7 encourages all organizations to heed the detailed guidance before applying the latest updates to ensure continued business process continuity.

Adobe

Most important amongst the six security advisories published by Adobe today is APSB21-09, detailing 23 CVEs affecting Adobe Acrobat and Reader. Six of these are rated Critical and allow Arbitrary Code Execution, and one of which (CVE-2021-21017), has been seen exploited in the wild in attacks targeting Adobe Reader users on Windows.

Summary Tables

Azure Vulnerabilities

CVEVulnerability TitleExploitedPublicly DisclosedCVSSv3 Base ScoreFAQ?
CVE-2021-24109Microsoft Azure Kubernetes Service Elevation of Privilege VulnerabilityNoNo6.8Yes
CVE-2021-24087Azure IoT CLI extension Elevation of Privilege VulnerabilityNoNo7Yes

Browser Vulnerabilities

CVEVulnerability TitleExploitedPublicly DisclosedCVSSv3 Base ScoreFAQ?
CVE-2021-24100Microsoft Edge for Android Information Disclosure VulnerabilityNoNo5Yes
CVE-2021-24113Microsoft Edge (Chromium-based) Security Feature Bypass VulnerabilityNoNo4.6Yes
CVE-2021-21148Chromium CVE-2021-21148: Heap buffer overflow in V8N/AN/AnanYes
CVE-2021-21147Chromium CVE-2021-21147: Inappropriate implementation in SkiaN/AN/AnanYes
CVE-2021-21146Chromium CVE-2021-21146: Use after free in NavigationN/AN/AnanYes
CVE-2021-21145Chromium CVE-2021-21145: Use after free in FontsN/AN/AnanYes
CVE-2021-21144Chromium CVE-2021-21144: Heap buffer overflow in Tab GroupsN/AN/AnanYes
CVE-2021-21143Chromium CVE-2021-21143: Heap buffer overflow in ExtensionsN/AN/AnanYes
CVE-2021-21142Chromium CVE-2021-21142: Use after free in PaymentsN/AN/AnanYes

Developer Tools Vulnerabilities

CVEVulnerability TitleExploitedPublicly DisclosedCVSSv3 Base ScoreFAQ?
CVE-2021-26700Visual Studio Code npm-script Extension Remote Code Execution VulnerabilityNoNo7.8Yes
CVE-2021-1639Visual Studio Code Remote Code Execution VulnerabilityNoNo7No
CVE-2021-1733Sysinternals PsExec Elevation of Privilege VulnerabilityNoYes7.8Yes
CVE-2021-24105Package Managers Configurations Remote Code Execution VulnerabilityNoNo8.4Yes
CVE-2021-24111.NET Framework Denial of Service VulnerabilityNoNo7.5No
CVE-2021-1721.NET Core and Visual Studio Denial of Service VulnerabilityNoYes6.5No
CVE-2021-26701.NET Core Remote Code Execution VulnerabilityNoYes8.1Yes
CVE-2021-24112.NET Core Remote Code Execution VulnerabilityNoNo8.1Yes

ESU Windows Vulnerabilities

CVEVulnerability TitleExploitedPublicly DisclosedCVSSv3 Base ScoreFAQ?
CVE-2021-24080Windows Trust Verification API Denial of Service VulnerabilityNoNo6.5No
CVE-2021-24074Windows TCP/IP Remote Code Execution VulnerabilityNoNo9.8Yes
CVE-2021-24094Windows TCP/IP Remote Code Execution VulnerabilityNoNo9.8Yes
CVE-2021-24086Windows TCP/IP Denial of Service VulnerabilityNoNo7.5Yes
CVE-2021-1734Windows Remote Procedure Call Information Disclosure VulnerabilityNoNo7.5Yes
CVE-2021-25195Windows PKU2U Elevation of Privilege VulnerabilityNoNo7.8Yes
CVE-2021-24088Windows Local Spooler Remote Code Execution VulnerabilityNoNo8.8No
CVE-2021-1727Windows Installer Elevation of Privilege VulnerabilityNoYes7.8No
CVE-2021-24077Windows Fax Service Remote Code Execution VulnerabilityNoNo9.8Yes
CVE-2021-1722Windows Fax Service Remote Code Execution VulnerabilityNoNo8.1Yes
CVE-2021-24102Windows Event Tracing Elevation of Privilege VulnerabilityNoNo7.8No
CVE-2021-24103Windows Event Tracing Elevation of Privilege VulnerabilityNoNo7.8No
CVE-2021-24078Windows DNS Server Remote Code Execution VulnerabilityNoNo9.8Yes
CVE-2021-24083Windows Address Book Remote Code Execution VulnerabilityNoNo7.8No

Exchange Server Vulnerabilities

CVEVulnerability TitleExploitedPublicly DisclosedCVSSv3 Base ScoreFAQ?
CVE-2021-24085Microsoft Exchange Server Spoofing VulnerabilityNoNo6.5Yes
CVE-2021-1730Microsoft Exchange Server Spoofing VulnerabilityNoNo5.4Yes

Microsoft Dynamics Vulnerabilities

CVEVulnerability TitleExploitedPublicly DisclosedCVSSv3 Base ScoreFAQ?
CVE-2021-1724Microsoft Dynamics Business Central Cross-site Scripting VulnerabilityNoNo6.1No
CVE-2021-24101Microsoft Dataverse Information Disclosure VulnerabilityNoNo6.5Yes

Microsoft Office Vulnerabilities

CVEVulnerability TitleExploitedPublicly DisclosedCVSSv3 Base ScoreFAQ?
CVE-2021-24073Skype for Business and Lync Spoofing VulnerabilityNoNo6.5No
CVE-2021-24099Skype for Business and Lync Denial of Service VulnerabilityNoNo6.5No
CVE-2021-24114Microsoft Teams iOS Information Disclosure VulnerabilityNoNo5.7Yes
CVE-2021-1726Microsoft SharePoint Spoofing VulnerabilityNoNo8Yes
CVE-2021-24072Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo8.8No
CVE-2021-24066Microsoft SharePoint Remote Code Execution VulnerabilityNoNo8.8Yes
CVE-2021-24071Microsoft SharePoint Information Disclosure VulnerabilityNoNo5.3Yes
CVE-2021-24067Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8Yes
CVE-2021-24068Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8Yes
CVE-2021-24069Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8Yes
CVE-2021-24070Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8Yes

System Center Vulnerabilities

CVEVulnerability TitleExploitedPublicly DisclosedCVSSv3 Base ScoreFAQ?
CVE-2021-1728System Center Operations Manager Elevation of Privilege VulnerabilityNoNo8.8Yes
CVE-2021-24092Microsoft Defender Elevation of Privilege VulnerabilityNoNo7.8Yes

Windows Vulnerabilities

CVEVulnerability TitleExploitedPublicly DisclosedCVSSv3 Base ScoreFAQ?
CVE-2021-1732Windows Win32k Elevation of Privilege VulnerabilityYesNo7.8No
CVE-2021-1698Windows Win32k Elevation of Privilege VulnerabilityNoNo7.8No
CVE-2021-24075Windows Network File System Denial of Service VulnerabilityNoNo6.8No
CVE-2021-24084Windows Mobile Device Management Information Disclosure VulnerabilityNoNo5.5Yes
CVE-2021-24096Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8No
CVE-2021-24093Windows Graphics Component Remote Code Execution VulnerabilityNoNo8.8Yes
CVE-2021-24106Windows DirectX Information Disclosure VulnerabilityNoYes5.5Yes
CVE-2021-24098Windows Console Driver Denial of Service VulnerabilityNoYes5.5Yes
CVE-2021-24091Windows Camera Codec Pack Remote Code Execution VulnerabilityNoNo7.8No
CVE-2021-24079Windows Backup Engine Information Disclosure VulnerabilityNoNo5.5Yes
CVE-2021-1731PFX Encryption Security Feature Bypass VulnerabilityNoNo5.5Yes
CVE-2021-24082Microsoft.PowerShell.Utility Module WDAC Security Feature Bypass VulnerabilityNoNo4.3No
CVE-2021-24076Microsoft Windows VMSwitch Information Disclosure VulnerabilityNoNo5.5Yes
CVE-2021-24081Microsoft Windows Codecs Library Remote Code Execution VulnerabilityNoNo7.8No

Summary Charts

2021-02-vuln_count_component.png2021-02-cvssv3_hist.png2021-02-vuln_count_severity.png2021-02-vuln_count_impact.png

Note: Chart data is reflective of data presented by Microsoft's CVRF at the time of writing.

Related blog posts