Successfully reported this slideshow.
Your SlideShare is downloading. ×

February 2021 Patch Tuesday

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Upcoming SlideShare
March 2021 Patch Tuesday
March 2021 Patch Tuesday
Loading in …3
×

Check these out next

1 of 44 Ad

February 2021 Patch Tuesday

Download to read offline

February Patch Tuesday is upon us! Top priorities this month are some Zero Days from both Microsoft and Adobe that need immediate attention. Microsoft has fixed 56 new and re-released 2 vulnerabilities (CVEs) across the Windows Operating System, Office, .Net Framework, a host of OS components and system tools and development tools. Adobe has also released a priority 1 update for Adobe Acrobat and Reader resolving 23 CVEs, one of which is actively exploited (Zero Day).

February Patch Tuesday is upon us! Top priorities this month are some Zero Days from both Microsoft and Adobe that need immediate attention. Microsoft has fixed 56 new and re-released 2 vulnerabilities (CVEs) across the Windows Operating System, Office, .Net Framework, a host of OS components and system tools and development tools. Adobe has also released a priority 1 update for Adobe Acrobat and Reader resolving 23 CVEs, one of which is actively exploited (Zero Day).

Advertisement
Advertisement

More Related Content

Slideshows for you (20)

Advertisement

Recently uploaded (20)

Advertisement

February 2021 Patch Tuesday

  1. 1. Copyright © 2021 Ivanti. All rights reserved. Patch Tuesday Webinar Wednesday, February 10, 2021 Hosted by: Chris Goettl & Todd Schell Dial in: 1-877-668-4490 (US) Event ID: 177 640 1649
  2. 2. Copyright © 2021 Ivanti. All rights reserved. Agenda February 2021 Patch Tuesday Overview In the News Bulletins and Releases Between Patch Tuesdays Q & A 1 2 3 4 5
  3. 3. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Overview
  4. 4. Copyright © 2021 Ivanti. All rights reserved.
  5. 5. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. In the News
  6. 6. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. In the News Source: Microsoft ▪ Lye-poisoning attack in Florida shows cybersecurity gaps in water systems ▪ https://www.nbcnews.com/tech/security/lye-poisoning-attack-florida-shows- cybersecurity-gaps-water-systems-n1257173 ▪ Malicious Code Injected via Google Chrome Extension Highlights App Risks ▪ https://www.darkreading.com/application-security/malicious-code-injected-via-google-chrome- extension-highlights-app-risks/d/d-id/1340100
  7. 7. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Known Exploited Vulnerability ▪ CVE-2021-1732 Windows Win32k Elevation of Privilege Vulnerability ▪ https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1732 Source: Microsoft ▪ Affected Products: Windows 10, Server 2016 and newer OS version ▪ Importance of Risk-based Prioritization: Microsoft Severity Important, CVSS Score 7.8
  8. 8. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Netlogon Secure Channel Connections ▪ Phase 2 update: Netlogon CVE-2020-1472 ▪ Deployment Guidelines ▪ Deploy August 11th updates ▪ Monitor for warning events ▪ Act on warning events ▪ Netlogon exploited in late September ▪ Emergency Directive 20-04 released on Sept 18, 2020 ▪ All Federal Agencies required to update and enable by Sept 21, 2020 ▪ Full enforcement mode goes into effect with February 9, 2021 OS update
  9. 9. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Known Exploited Vulnerability ▪ CVE-2021-21017 Adobe Acrobat and Reader Arbitrary Code Execution Source: Microsoft ▪ Affected Products: Acrobat DC, Acrobat Reader DC, Acrobat 2020, Acrobat Reader 2020, Acrobat 2017, Acrobat Reader 2017 ▪ Adobe has received a report that CVE-2021-21017 has been exploited in the wild in limited attacks targeting Adobe Reader users on Windows. ▪ https://threatpost.com/exploited-windows-kernel- bug-takeover/163800/
  10. 10. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Publicly Disclosed Vulnerabilities ▪ CVE-2021-1721 .NET Core and Visual Studio Denial of Service Vulnerability ▪ https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1721 ▪ CVE-2021-1727 Windows Installer Elevation of Privilege Vulnerability ▪ https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1727 ▪ CVE-2021-1733 Sysinternals PsExec Elevation of Privilege Vulnerability ▪ https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1733 ▪ CVE-2021-24098 Windows Console Driver Denial of Service Vulnerability ▪ https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24098 ▪ CVE-2021-24106 Windows DirectX Information Disclosure Vulnerability ▪ https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-24106 ▪ CVE-2021-26701 .NET Core Remote Code Execution Vulnerability ▪ https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26701 Source: Microsoft
  11. 11. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Microsoft Patch Tuesday Updates of Interest ▪ Advisory 990001 Latest Servicing Stack Updates (SSU) ▪ https://msrc.microsoft.com/update-guide/en-US/vulnerability/ADV990001 ▪ Updated SSUs this month ▪ Windows 10 ▪ Windows 10 1607/Server 2016 ▪ Windows 10 1809/Server 2019 ▪ Windows 10 1909/Windows Server 1909 ▪ Development Tool and Other Updates ▪ .NET Core 2.1, 3.1 and 5.0 ▪ Azure Kubernetes Service ▪ Package Manager Configurations ▪ PsExec ▪ Visual Studio 2017-2019 ▪ Visual Studio Code Source: Microsoft
  12. 12. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Windows 10 Lifecycle Awareness Windows 10 Enterprise and Education Version Release Date End of Support Date 20H2 10/20/2020 5/9/2023 2004 5/27/2020 12/14/2021 1909 11/12/2019 5/10/2022 1903 5/21/2019 12/8/2020 1809 11/13/2018 5/11/2021 1803 4/30/2018 5/11/2021 1709 10/17/2017 10/13/2020 Windows Datacenter and Standard Server Version Release Date End of Support Date 20H2 10/20/2020 5/10/2022 2004 5/27/2020 12/14/2021 1909 11/12/2019 5/11/2021 1903 5/21/2019 12/8/2020 ▪ Lifecycle Fact Sheet ▪ https://docs.microsoft.com/en-us/lifecycle/faq/windows ▪ https://docs.microsoft.com/en-us/lifecycle/products/windows-server ▪ https://docs.microsoft.com/en-us/lifecycle/products/windows-10-enterprise- and-education
  13. 13. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Patch Content Announcements ▪ Announcements Posted on Community Forum Pages ▪ https://forums.ivanti.com/s/group/CollaborationGroup/00Ba0000009oKICEA2 ▪ Subscribe to receive email for the desired product(s)
  14. 14. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Bulletins and Releases
  15. 15. Copyright © 2021 Ivanti. All rights reserved. APSB21-09: Security Update for Adobe Acrobat and Reader ▪ Maximum Severity: Critical ▪ Affected Products: Adobe Acrobat and Reader (all current versions) ▪ Description: Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address multiple critical and important vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user. ▪ Impact: Remote Code Execution, Denial of Service, Elevation of Privilege and Information Disclosure ▪ Fixes 23 Vulnerabilities: CVE-2021-21017 has been exploited in the wild in limited attacks targeting Adobe Reader users on Windows ▪ https://helpx.adobe.com/security/products/acrobat/apsb21-09.html ▪ Restart Required: Requires application restart
  16. 16. Copyright © 2021 Ivanti. All rights reserved. MS21-02-W10: Windows 10 Update ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft Windows 10 Versions 1607, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, Server 2016, Server 2019, Server version 1909, Server version 2004, Server version 20H2,IE 11, Legacy Edge and Edge Chromium ▪ Description: This bulletin references 6 KB articles. See KBs for the list of changes. ▪ Impact: Remote Code Execution, Security Feature Bypass, Denial of Service, Elevation of Privilege and Information Disclosure ▪ Fixes 28 Vulnerabilities: CVE-2021-1727, CVE-2021-24098, and CVE-2021- 24106 are publicly disclosed. CVE-2021-1732 is known exploited. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires restart ▪ Known Issues: See next slides
  17. 17. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. February Known Issues for Windows 10 ▪ KB 4601318 – Windows 10, Version 1607 and Server 2016 ▪ [Min Password] After installing KB4467684, the cluster service may fail to start with the error “2245 (NERR_PasswordTooShort)” if the group policy “Minimum Password Length” is configured with greater than 14 characters. Workaround: Set the domain default "Minimum Password Length" policy to less than or equal to 14 characters. Microsoft is working on a resolution. ▪ KB 4601345 – Windows 10, Version 1809, Server 2019 All Versions ▪ [Asian Packs] After installing KB 4493509, devices with some Asian language packs installed may receive the error, "0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.“ Workaround: Uninstall and reinstall any recently added language packs or select Check for Updates and install the April 2019 Cumulative Update. See KB for more recovery details. Microsoft is working on a resolution.
  18. 18. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. February Known Issues for Windows 10 (cont) ▪ KB 4601315 – Windows 10 version 1909, Windows Server version 1909 ▪ [Outdated Updates] System and user certificates might be lost when updating a device from Windows 10, version 1809 or later to a later version of Windows 10. This primarily happens when managed devices are updated using outdated bundles or media through an update management tool such as Windows Server Update Services (WSUS) or Microsoft Endpoint Configuration Manager. Note: Devices using Windows Update for Business or that connect directly to Windows Update are not impacted. Workaround: If you have already encountered this issue on your device, you can mitigate it within the uninstall window by going back to your previous version of Windows. The uninstall window might be 10 or 30 days depending on the configuration of your environment and the version you’re updating to. See directions here. Microsoft is working on a resolution. ▪ NOTE: Incompatibility found with Discord app. Update Discord to latest version.
  19. 19. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. February Known Issues for Windows 10 (cont) ▪ KB 4601319 – Windows 10 version 2004, Windows Server version 2004, Windows 10 version 20H2, Windows Server version 20H2 ▪ [Editor] When using the Microsoft Japanese Input Method Editor (IME) to enter Kanji characters in an app that automatically allows the input of Furigana characters, you might not get the correct Furigana characters. You might need to enter the Furigana characters manually. Workaround: Microsoft is working on a resolution. ▪ [Outdated Updates] ▪ NOTE: Incompatibility found with Discord app. Update Discord to latest version.
  20. 20. Copyright © 2021 Ivanti. All rights reserved. MS21-02-MR2K8-ESU: Monthly Rollup for Windows Server 2008 ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft Windows Server 2008 and IE 9 ▪ Description: This security update includes improvements and fixes that were a part of update KB 4598288 (released January 12, 2021). Bulletin is based on KB 4601360. Security updates to Windows App Platform and Frameworks, Windows Core Networking, and Windows Hybrid Cloud Networking. ▪ Impact: Remote Code Execution, Denial of Service, Elevation of Privilege and Information Disclosure ▪ Fixes 12 Vulnerabilities: CVE-2021-1727 is publicly disclosed. No CVEs are known exploited. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires restart ▪ Known Issues: [File Rename] See next slide.
  21. 21. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. February Known Issues for Server 2008 ▪ KB 4601360 – Windows Server 2008 (Monthly Rollup) ▪ [File Rename] Certain operations, such as rename, that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. Workaround: Perform the operation from a process that has administrator privilege or perform the operation from a node that doesn’t have CSV ownership. Microsoft is working on a resolution. ▪ KB 4601366 – Windows Server 2008 (Security-only Update) ▪ [File Rename]
  22. 22. Copyright © 2021 Ivanti. All rights reserved. MS21-02-SO2K8-ESU: Security-only Update for Windows Server 2008 ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft Windows Server 2008 ▪ Description: Bulletin is based on KB 4601366. Security updates to Windows App Platform and Frameworks, Windows Core Networking, and Windows Hybrid Cloud Networking. ▪ Impact: Remote Code Execution, Denial of Service, Elevation of Privilege and Information Disclosure ▪ Fixes 12 Vulnerabilities: CVE-2021-1727 is publicly disclosed. No CVEs are known exploited. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires restart ▪ Known Issues: [File Rename] See previous slide.
  23. 23. Copyright © 2021 Ivanti. All rights reserved. MS21-02-MR7-ESU: Monthly Rollup for Win 7 MS21-02-MR2K8R2-ESU Monthly Rollup for Server 2008 R2 ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft Windows 7, Server 2008 R2, and IE ▪ Description: This security update includes improvements and fixes that were a part of update KB 4598279 (released January 12, 2021). Bulletin is based on KB 4601347. Security updates to Windows App Platform and Frameworks, Windows Hybrid Cloud Networking, and Windows Core Networking. ▪ Impact: Remote Code Execution, Denial of Service, Elevation of Privilege and Information Disclosure ▪ Fixes 14 Vulnerabilities: CVE-2021-1727 is publicly disclosed. No CVEs are known exploited. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires restart ▪ Known Issues: [File Rename]
  24. 24. Copyright © 2021 Ivanti. All rights reserved. MS21-02-SO7-ESU: Security-only Update for Win 7 MS21-02-SO2K8R2-ESU: Security-only Update for Server 2008 R2 ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft Windows 7 and Server 2008 R2 ▪ Description: Bulletin is based on KB 4601363. Security updates to Windows App Platform and Frameworks, Windows Hybrid Cloud Networking, and Windows Core Networking. ▪ Impact: Remote Code Execution, Denial of Service, Elevation of Privilege and Information Disclosure ▪ Fixes 14 Vulnerabilities: CVE-2021-1727 is publicly disclosed. No CVEs are known exploited. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires restart ▪ Known Issues: [File Rename]
  25. 25. Copyright © 2021 Ivanti. All rights reserved. MS21-02-MR8: Monthly Rollup for Server 2012 ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft Windows Server 2012 and IE ▪ Description: This security update includes improvements and fixes that were a part of update KB 4598278 (released previous January 12, 2021). Bulletin is based on KB 4601348. Security updates to Windows App Platform and Frameworks, Windows Core Networking, Windows Hybrid Cloud Networking, and Windows Peripherals. ▪ Impact: Remote Code Execution, Denial of Service, Elevation of Privilege and Information Disclosure ▪ Fixes 16 Vulnerabilities: CVE-2021-1727 is publicly disclosed. No CVEs are known exploited. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires restart ▪ Known Issues: [File Rename]
  26. 26. Copyright © 2021 Ivanti. All rights reserved. MS21-02-SO8: Security-only Update for Windows Server 2012 ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft Windows Server 2012 ▪ Description: Bulletin is based on KB 4601357. Security updates to Windows App Platform and Frameworks, Windows Core Networking, Windows Hybrid Cloud Networking, and Windows Peripherals. ▪ Impact: Remote Code Execution, Denial of Service, Elevation of Privilege and Information Disclosure ▪ Fixes 16 Vulnerabilities: CVE-2021-1727 is publicly disclosed. No CVEs are known exploited. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires restart ▪ Known Issues: [File Rename]
  27. 27. Copyright © 2021 Ivanti. All rights reserved. MS21-02-MR81: Monthly Rollup for Win 8.1 and Server 2012 R2 ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft Windows 8.1, Server 2012 R2, and IE ▪ Description: This security update includes improvements and fixes that were a part of update KB 4598285 (released January 12, 2021). Bulletin is based on KB 4601384. Security updates to Windows App Platform and Frameworks, Windows Hybrid Cloud Networking, and Windows Core Networking. ▪ Impact: Remote Code Execution, Denial of Service, Elevation of Privilege and Information Disclosure ▪ Fixes 16 Vulnerabilities: CVE-2021-1727 is publicly disclosed. No CVEs are known exploited. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires restart ▪ Known Issues: [File Rename]
  28. 28. Copyright © 2021 Ivanti. All rights reserved. MS21-02-SO81: Security-only Update for Win 8.1 and Server 2012 R2 ▪ Maximum Severity: Critical ▪ Affected Products: Microsoft Windows 8.1, Server 2012 R2 ▪ Description: Bulletin is based on KB 4601349. Security updates to Windows App Platform and Frameworks, Windows Hybrid Cloud Networking, and Windows Core Networking. ▪ Impact: Remote Code Execution, Denial of Service, Elevation of Privilege and Information Disclosure ▪ Fixes 16 Vulnerabilities: CVE-2021-1727 is publicly disclosed. No CVEs are known exploited. See the Security Update Guide for the complete list of CVEs. ▪ Restart Required: Requires restart ▪ Known Issues: [File Rename]
  29. 29. Copyright © 2021 Ivanti. All rights reserved. MS21-02-OFF: Security Updates for Microsoft Office ▪ Maximum Severity: Important ▪ Affected Products: Excel 2010-2016, Office Online Server, Office 2019 for macOS, and Office Web Apps Server ▪ Description: This security update resolves multiple vulnerabilities in Microsoft Office applications. Consult the Security Update Guide for specific details on each. This bulletin references 5 KB articles plus release notes for the MacOS Office. ▪ Impact: Remote Code Execution ▪ Fixes 4 Vulnerabilities: No vulnerabilities are publicly disclosed or known exploited. CVE-2021-24067, CVE-2021-24068, CVE-2021-24069 and CVE-2021- 24070 are fixed in this release. ▪ Restart Required: Requires application restart ▪ Known Issues: None reported
  30. 30. Copyright © 2021 Ivanti. All rights reserved. MS21-02-O365: Security Updates Microsoft 365 Apps and Office 2019 ▪ Maximum Severity: Important ▪ Affected Products: Microsoft 365 Apps, Office 2019 ▪ Description: This month’s update resolved various bugs and performance issues in Microsoft 365 Apps and Office 2019 applications. Information on Microsoft 365 Apps security updates is available at https://docs.microsoft.com/en- us/officeupdates/microsoft365-apps-security-updates. ▪ Impact: Remote Code Execution ▪ Fixes 3 Vulnerabilities: No CVEs are publicly disclosed or known exploited. CVE- 2021-24067, CVE-2021-24069 and CVE-2021-24070 are fixed in this release. ▪ Restart Required: Requires application restart ▪ Known Issues: None reported
  31. 31. Copyright © 2021 Ivanti. All rights reserved. MS21-02-SPT: Security Updates for SharePoint Server ▪ Maximum Severity: Important ▪ Affected Products: Microsoft SharePoint Enterprise Server 2016, Microsoft SharePoint Foundation Server 2010 and 2013, and Microsoft SharePoint Server 2019 ▪ Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. This bulletin is based on 4 KB articles. ▪ Impact: Remote Code Execution, Spoofing and Information Disclosure ▪ Fixes 4 Vulnerabilities: No CVEs are publicly disclosed or known exploited. CVE- 2021-1726, CVE-2021-24066, CVE-2021-24071 and CVE-2021-24072 are fixed in this release. ▪ Restart Required: Requires restart ▪ Known Issues: If your customized SharePoint pages use the SPWorkflowDataSource or FabricWorkflowInstanceProvider user control, some functions on those pages may not work. To resolve this issue, see KB 5000640.
  32. 32. Copyright © 2021 Ivanti. All rights reserved. MS21-02-MRNET: Monthly Rollup for Microsoft .Net ▪ Maximum Severity: Important ▪ Affected Products: Microsoft Windows .Net Framework 4.6 through 4.8 ▪ Description: This security update addresses a denial of service vulnerability in .NET Framework. This bulletin references 11 KB articles. ▪ Impact: Denial of Service ▪ Fixes 1 Vulnerability: CVE-2021-24111 is not publicly disclosed or known exploited. ▪ Restart Required: Does not require a system restart after you apply it unless files that are being updated are locked or are being used. ▪ Known Issues: See next slide
  33. 33. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. February Known Issues for .NET Framework Source: Microsoft
  34. 34. Copyright © 2021 Ivanti. All rights reserved. MS21-02-SONET: Security-only Update for Microsoft .Net ▪ Maximum Severity: Important ▪ Affected Products: Microsoft Windows .Net Framework 4.6 through 4.8 ▪ Description: This security update addresses a denial of service vulnerability in .NET Framework. This bulletin references 4 KB articles. ▪ Impact: Denial of Service ▪ Fixes 1 Vulnerability: CVE-2021-24111 is not publicly disclosed or known exploited. ▪ Restart Required: Does not require a system restart after you apply it unless files that are being updated are locked or are being used. ▪ Known Issues: See previous slide
  35. 35. Copyright © 2021 Ivanti. All rights reserved. MS21-02-EXCH: Security Updates for Exchange Server ▪ Maximum Severity: Important ▪ Affected Products: Microsoft Exchange Server 2016 and 2019 ▪ Description: This security update fixes vulnerabilities in Microsoft Exchange. This bulletin is based on KBs 4571787, 4571788, and 4602269. ▪ Impact: Spoofing ▪ Fixes 2 Vulnerabilities: CVE-2021-1730 and CVE-2021-24085 are not publicly disclosed or known exploited. ▪ Restart Required: Requires restart ▪ Known Issues: Multiple issues and workarounds per each respective KB
  36. 36. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Between Patch Tuesdays
  37. 37. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Release Summary ▪ Security Updates: Firefox (1), Firefox ESR (1), Google Chrome (3), Java 8 (1), Java Development Kit 8 (1), SeaMonkey (1), Thunderbird (1), Wireshark (1) ▪ Non-Security Updates: AIMP (1), AdoptOpenJDK JDK 11 (1), AdoptOpenJDK JDK 8 (1), AdoptOpenJDK JRE 11 (1), AdoptOpenJDK JRE 8 (1), Azul Zulu JDK 11 (1), Azul Zulu JDK 8 (1), Azul Zulu JRE 11 (1), Azul Zulu JRE 8Box Edit (1), BlueJeans Outlook Addin (1), Box Drive (1), Ccleaner (1), ClickShare App Machine-Wide Installer (2), Amazon Corretto 11 (1), Amazon Corretto 8 (1), Cisco WebEx Teams (3), Citrix Workspace App (2), Dropbox (3), Evernote (2), Firefox (1), Firefox ESR, (1), FileZilla Client (1), Google Drive File Stream (1), Falcon sensor for Windows (1), Google Backup and Sync (2), Google Chrome (1), GIT for windows (1), GoodSync (3), Inkscape (1), IrfanView (1), Cisco Jabber (1), Jabra Direct (1), Java Development Kit 11 (1), LibreOffice (1), Nitro Pro (1), Nitro Pro Enterprise (1), Node.JS (4), NextCloud Desktop Client (1), Opera Browser (2), Apache OpenOffice (1), VirtualBox (1), PDF-Xchange PRO (3), Paint.NET (1), Plantronics Hub (1), Plex Media Server (3), RingCentral App (Machine-Wide Installer) (1), Skype (1), Snagit (1), Splunk Universal Forwarder (1), Sourcetree for Windows Enterprise (1), Tableau Desktop (4), Tableau Prep Builder (1), Tableau Reader (1), Thunderbird (1), TortoiseHG (1), Apache Tomcat (3), TeamViewer (2), UltraVNC (1), VLC Media Player (1), VMWare Tools (1), WinDVD Pro (1), WinSCP (1), Wireshark (1), WinMerge (1), WinZip (1), XnView (1), Zoom Client (3), Zoom Outlook Plugin (1)
  38. 38. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Third Party CVE Information ▪ Firefox 85.0 ▪ FF-210126, QFF850 ▪ Fixes 13 Vulnerabilities: CVE-2021-23953, CVE-2021-23954, CVE-2021-23955, CVE-2021-23956, CVE-2021-23957, CVE-2021-23958, CVE-2021-23959, CVE- 2021-23960, CVE-2021-23961, CVE-2021-23962, CVE-2021-23963, CVE-2021- 23964, CVE-2021-23965 ▪ Firefox ESR 78.7.0 ▪ FFE-210126, QFFE7870 ▪ Fixes 5 Vulnerabilities: CVE-2020-26976, CVE-2021-23953, CVE-2021-23954, CVE-2021-23960, CVE-2021-23964
  39. 39. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Third Party CVE Information (cont) ▪ Google Chrome 88.0.4324.96 ▪ CHROME-210118, QGC880432496 ▪ Fixes 39 Vulnerabilities: CVE-2020-15995, CVE-2020-16043, CVE-2020-16044, CVE-2021-21106, CVE-2021-21107, CVE-2021-21108, CVE-2021-21109, CVE- 2021-21110, CVE-2021-21111, CVE-2021-21112, CVE-2021-21113, CVE-2021- 21114, CVE-2021-21115, CVE-2021-21116, CVE-2021-21117, CVE-2021-21118, CVE-2021-21119, CVE-2021-21120, CVE-2021-21121, CVE-2021-21122, CVE- 2021-21123, CVE-2021-21124, CVE-2021-21125, CVE-2021-21126, CVE-2021- 21127, CVE-2021-21128, CVE-2021-21129, CVE-2021-21130, CVE-2021-21131, CVE-2021-21132, CVE-2021-21133, CVE-2021-21134, CVE-2021-21135, CVE- 2021-21136, CVE-2021-21137, CVE-2021-21138, CVE-2021-21139, CVE-2021- 21140, CVE-2021-21141
  40. 40. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Third Party CVE Information (cont) ▪ Google Chrome 88.0.4324.146 ▪ CHROME-210202, QGC8804324146 ▪ Fixes 26 Vulnerabilities: CVE-2020-16044, CVE-2021-21117, CVE-2021-21118, CVE-2021-21119, CVE-2021-21120, CVE-2021-21121, CVE-2021-21122, CVE- 2021-21123, CVE-2021-21124, CVE-2021-21125, CVE-2021-21126, CVE-2021- 21127, CVE-2021-21128, CVE-2021-21129, CVE-2021-21130, CVE-2021-21131, CVE-2021-21132, CVE-2021-21133, CVE-2021-21134, CVE-2021-21135, CVE- 2021-21136, CVE-2021-21137, CVE-2021-21138, CVE-2021-21139, CVE-2021- 21140, CVE-2021-21141 ▪ Google Chrome 88.0.4324.150 ▪ CHROME-210204, QGC8804324150 ▪ Fixes 1 Vulnerability: CVE-2021-21148
  41. 41. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Third Party CVE Information (cont) ▪ Java 8 Update 281 ▪ JAVA8-281, QJAVA8U281 ▪ Fixes 1 Vulnerability: CVE-2021-14803 ▪ Java Development Kit 8 Update 281 ▪ JDK8-281, QJDK8U281 ▪ Fixes 1 Vulnerability: CVE-2021-14803 ▪ Wireshark 3.4.3 ▪ WIRES34-210201, QWIRES343 ▪ Fixes 2 Vulnerabilities: CVE-2021-22173, CVE-2021-22174 ▪ Thunderbird 78.7.0 ▪ TB-210127, QTB7870 ▪ Fixes 6 Vulnerabilities: CVE-2020-15685, CVE-2020-26976, CVE-2021-23953, CVE-2021-23954, CVE-2021-23960, CVE-2021-23964
  42. 42. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Third Party CVE Information (cont) ▪ SeaMonkey 2.53.6 ▪ SM20-210122, QSM2536 ▪ Fixes 14 Vulnerabilities: CVE-2018-12359, CVE-2018-12360, CVE-2018-12361, CVE- 2018-12362, CVE-2018-12363, CVE-2018-12364, CVE-2018-12365, CVE-2018-12366, CVE-2018-12367, CVE-2018-12368, CVE-2018-12371, CVE-2018-5156, CVE-2018-5187, CVE-2018-5188
  43. 43. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Q & A
  44. 44. Copyright © 2021 Ivanti. All rights reserved. Copyright © 2021 Ivanti. All rights reserved. Thank You!

×