Reports indicated that multiple vulnerabilities in Microsoft Windows and Server (CVE-2021-34527, CVE-2021-34448, CVE-2021-33771 and CVE-2021-31979) are being actively exploited. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Microsoft Windows 7, 8.1, RT 8.1, 10
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019
Microsoft Windows Server, version 1909, version 2004, version 20H2
Microsoft Office 2013, 2013 RT, 2016, 2019, 2019 for Mac
Microsoft Dynamics 365 Business Central 2020, 2021
Microsoft Bing Search for Android
Microsoft Malware Protection Engine
Open Enclave SDK
Power BI Report Server
Visual Studio Code
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, information disclosure, denial of service, security feature bypass, spoofing and defense in depth.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.