Latest Microsoft Windows Updates Patch Dozens of Security Flaws


[![](https://thehackernews.com/images/-mqB1LJpewfs/YJuapEGzrpI/AAAAAAAAChc/PMqXgSaopa04nju1H68tJ4fqClZ3HLdKgCLcBGAsYHQ/s0/windows-update.jpg)](<https://thehackernews.com/images/-mqB1LJpewfs/YJuapEGzrpI/AAAAAAAAChc/PMqXgSaopa04nju1H68tJ4fqClZ3HLdKgCLcBGAsYHQ/s0/windows-update.jpg>) Microsoft on Tuesday rolled out its scheduled [monthly security update](<https://msrc.microsoft.com/update-guide/releaseNote/2021-May>) with patches for 55 security flaws affecting Windows, Exchange Server, Internet Explorer, Office, Hyper-V, Visual Studio, and Skype for Business. Of these 55 bugs, four are rated as Critical, 50 are rated as Important, and one is listed as Moderate in severity. Three of the vulnerabilities are publicly known, although, unlike [last month](<https://thehackernews.com/2021/04/nsa-discovers-new-vulnerabilities.html>), none of them are under active exploitation at the time of release. The most critical of the flaws addressed is [**CVE-2021-31166**](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31166>), a wormable remote code execution vulnerability in the HTTP protocol stack. The issue, which could allow an unauthenticated attacker to send a specially crafted packet to a targeted server, is rated 9.8 out of a maximum of 10 on the CVSS scale. Another vulnerability of note is a remote code execution flaw in Hyper-V ([**CVE-2021-28476**](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28476>)), which [also scores](<https://thehackernews.com/>) the highest severity among all flaws patched this month with a CVSS rating of 9.9. "This issue allows a guest VM to force the Hyper-V host's kernel to read from an arbitrary, potentially invalid address," Microsoft said in its advisory. "The contents of the address read would not be returned to the guest VM. In most circumstances, this would result in a denial of service of the Hyper-V host (bugcheck) due to reading an unmapped address." "It is possible to read from a memory mapped device register corresponding to a hardware device attached to the Hyper-V host which may trigger additional, hardware device specific side effects that could compromise the Hyper-V host's security," the Windows maker noted. In addition, the Patch Tuesday update addresses a scripting engine memory corruption flaw in Internet Explorer ([**CVE-2021-26419**](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26419>)) and four weaknesses in Microsoft Exchange Server, marking the third consecutive month Microsoft has shipped fixes for the product since [ProxyLogon exploits](<https://thehackernews.com/2021/03/microsoft-issues-security-patches-for.html>) came to light in March — * [**CVE-2021-31207**](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207>) (CVSS score: 6.6) - Security Feature Bypass Vulnerability (publicly known) * [**CVE-2021-31195**](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31195>) (CVSS score: 6.5) - Remote Code Execution Vulnerability * [**CVE-2021-31198**](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31198>) (CVSS score: 7.8) - Remote Code Execution Vulnerability * [**CVE-2021-31209**](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31209>) (CVSS score: 6.5) - Spoofing Vulnerability While CVE-2021-31207 and CVE-2021-31209 were demonstrated at the [2021 Pwn2Own contest](<https://thehackernews.com/2021/04/windows-ubuntu-zoom-safari-ms-exchange.html>), Orange Tsai from DEVCORE, who disclosed the ProxyLogon Exchange Server vulnerability, is credited with reporting CVE-2021-31195. Elsewhere, the update addresses a slew of privilege escalation bugs in Windows Container Manager Service, an information disclosure vulnerability in Windows Wireless Networking, and several remote code execution flaws in Microsoft Office, Microsoft SharePoint Server, Skype for Business, and Lync, Visual Studio, and Windows Media Foundation Core. To install the latest security updates, Windows users can head to Start > Settings > Update & Security > Windows Update, or by selecting Check for Windows updates. Found this article interesting? Follow THN on [Facebook](<https://www.facebook.com/thehackernews>), [Twitter __](<https://twitter.com/thehackersnews>) and [LinkedIn](<https://www.linkedin.com/company/thehackernews/>) to read more exclusive content we post.