Connect with us

Hi, what are you looking for?



Microsoft Plans Critical IE Patch Tuesday Update

Microsoft is planning to release nine security bulletins this month as part of its Patch Tuesday release.

Microsoft is planning to release nine security bulletins this month as part of its Patch Tuesday release.

Just two of the bulletins are rated ‘critical’ – one affecting Internet Explorer and the other Microsoft Windows – and both of those address remote code execution issues. The seven other bulletins are rated as ‘important’ and cover vulnerabilities in Microsoft Office, Windows, Microsoft Security Software and Microsoft Server Software.

“Once again there is an IE patch which is rated critical, but this one differs from last month’s incarnation by applying to all supported versions of IE (6-10) on the relevant platforms, including IE 10 on Windows 7 and 8,” said Ross Barrett, Rapid7’s senior manager security engineering. “Due to the widespread use of IE and subsequently high degree of exposure for any group or individual using it, combined with the severity, this is where I would prioritize patching efforts.”

“Since there are only two critical advisories this month, it follows that the other critical issue which affects all versions of Windows from XP/2003 to 7/2008R2 is the next highest patching priority,” he added. “It’s most likely that this is another parsing library bug (hence the required restart), though there is an outside chance that this could prove to be a truly worm-able issue affecting a service available on all Windows versions.”

Though only two of the patches have been classified as critical, the sheer number of patches planned for this month is noteworthy, said Alex Horan, senior product manager at CORE Security.

“Large numbers of updates lead to more administration and ultimately delays,” he said. “This can allow critical vulnerabilities to be exploited while less significant concerns simply cloud the security picture.”

Besides bulletin one, he also advised organizations to pay attention to bulletin 8, which he argued may represent one of the first reported vulnerabilities for Microsoft Office Web Apps 2010, which “would be significant in and of itself.” 

Advertisement. Scroll to continue reading.

The security updates are slated to be released Tuesday, April 9.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.