Reports indicated that a remote code execution vulnerability in Microsoft Exchange Server (CVE-2021-42321) and security feature bypass vulnerability in Microsoft Excel (CVE-2021-42292) are being actively exploited. System administrators are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Microsoft Edge (Chromium-based)
Microsoft Windows 7, 8.1, RT 8.1, 10, 11
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022
Microsoft Windows Server, version 2004, version 20H2
Microsoft Office 2013, 2013 RT, 2016, 2019, 2019 for Mac, LTSC 2021, LTSC for Mac 2021
Microsoft Office Online Server
Microsoft Office Web Apps Server 2013
Microsoft Excel 2013, 2013 RT, 2016
Microsoft 365 Apps for Enterprise
Microsoft Dynamics 365 (on-premises) version 9.0, version 9.1
Microsoft Exchange Server 2013, 2016, 2019
Microsoft SharePoint Enterprise Server 2013
Microsoft Visual Studio 2015, 2017, 2019
Microsoft Azure RTOS
Microsoft Azure Sphere
Microsoft Malware Protection Engine
Power BI Report Server
Remote Desktop client for Windows Desktop
Visual Studio Code
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, information disclosure, denial of service, security feature bypass, spoofing and tampering.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.