漏洞情报|2021年1月“微软补丁日” Windows Defender等多个产品高危漏洞风险通告(CVE-2021-1647)

2021-01-20 5,878

近日,腾讯云安全运营中心监测到,微软发布了2021年1月的例行安全更新公告,包含漏洞CVE编号83个,其中严重级别漏洞10个,重要级别73个。远程代码执行漏洞14个,安全功能绕过漏洞6个,信息泄露漏洞11个,特权提升34个。涉及关于Windows、Windows Server、Edge、Office、Visual Studio、.Net、ASP.net、Azure等多个产品的高危漏洞。

为避免您的业务受影响,腾讯云安全建议您及时开展安全自查,如在受影响范围,请您及时进行更新修复,避免被外部攻击者入侵。

漏洞详情

在此次公告中Windows Defender(CVE-2021-1647)漏洞需要重点关注:

CVE-2021-1647:
该漏洞为Microsoft Defender的远程代码执行漏洞。攻击者可通过构造特殊的PE文件,使存在漏洞的Microsoft Defender扫描该恶意文件来执行任意代码。据相关情报,目前已有该漏洞在野利用。

风险等级

高风险

漏洞风险

CVE-2021-1647:攻击者可利用该漏洞在受影响的系统上执行任意代码

影响版本

受CVE-2021-1647影响的Microsoft Malware Protection Engine版本 < 1.1.17700.4

受到CVE-2021-1647影响的产品及平台:
Microsoft System Center 2012 Endpoint Protection    
Microsoft Security Essentials    
Microsoft System Center 2012 R2 Endpoint Protection    
Microsoft System Center Endpoint Protection    
Windows Defender:Windows 10 Version 1607 for 32-bit Systems
Windows Defender:Windows 10 Version 1607 for x64-based Systems
Windows Defender:Windows 10 Version 1803 for 32-bit Systems
Windows Defender:Windows 10 Version 1803 for ARM64-based Systems
Windows Defender:Windows 10 Version 1803 for x64-based Systems
Windows Defender:Windows 10 Version 1809 for 32-bit Systems
Windows Defender:Windows 10 Version 1809 for ARM64-based Systems
Windows Defender:Windows 10 Version 1809 for x64-based Systems
Windows Defender:Windows 10 Version 1909 for 32-bit Systems
Windows Defender:Windows 10 Version 1909 for ARM64-based Systems
Windows Defender:Windows 10 Version 1909 for x64-based Systems
Windows Defender:Windows 10 Version 2004 for 32-bit Systems
Windows Defender:Windows 10 Version 2004 for ARM64-based Systems
Windows Defender:Windows 10 Version 2004 for x64-based Systems
Windows Defender:Windows 10 Version 20H2 for 32-bit Systems
Windows Defender:Windows 10 Version 20H2 for ARM64-based Systems
Windows Defender:Windows 10 Version 20H2 for x64-based Systems
Windows Defender:Windows 10 for 32-bit Systems
Windows Defender:Windows 10 for x64-based Systems
Windows Defender:Windows 7 for 32-bit Systems Service Pack 1
Windows Defender:Windows 7 for x64-based Systems Service Pack 1
Windows Defender:Windows 8.1 for 32-bit systems
Windows Defender:Windows 8.1 for x64-based systems
Windows Defender:Windows RT 8.1
Windows Defender:Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Defender:Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Defender:Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Defender:Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Defender:Windows Server 2012
Windows Defender:Windows Server 2012 (Server Core installation)
Windows Defender:Windows Server 2012 R2
Windows Defender:Windows Server 2012 R2 (Server Core installation)
Windows Defender:Windows Server 2016
Windows Defender:Windows Server 2016  (Server Core installation)
Windows Defender:Windows Server 2019
Windows Defender:Windows Server 2019  (Server Core installation)
Windows Defender:Windows Server, version 1909 (Server Core installation)
Windows Defender:Windows Server, version 2004 (Server Core installation)
Windows Defender:Windows Server, version 20H2 (Server Core Installation)

其他漏洞影响的组件可详细参考官方公告

修复建议



微软官方已发布漏洞修复更新,腾讯云安全建议您:
1)更新系统补丁:确保服务器打上了所需的补丁,打开Windows Update更新功能或下载修复补丁,点击“检查更新”
2)不要打开来历不明的文件或者链接:避免被攻击者利用在机器上执行恶意代码。

【备注】:建议您在安装补丁前做好数据备份工作,避免出现意外

漏洞参考

官方安全公告:

https://msrc.microsoft.com/update-guide/releaseNote/2021-Jan



本文作者:YDclub

本文为安全脉搏专栏作者发布,转载请注明:https://www.secpulse.com/archives/151730.html

Tags:
评论  (0)
快来写下你的想法吧!

YDclub

文章数:82 积分: 214

我们正努力成为云上安全的技术领导者~

安全问答社区

安全问答社区

脉搏官方公众号

脉搏公众号