It’s raining patches in the Microsoft Windows ecosystem.
The Redmond, Wash. software giant on Tuesday dropped a mega-batch of security updates with patches for a whopping 89 documented vulnerabilities, including one used in zero-day attacks against some in the white-hat hacker community.
This month’s Patch Tuesday whopper comes just one week after Microsoft scrambled out emergency fixes to provide cover for in-the-wild nation-state attacks targeting Exchange Server installations.
Microsoft has blamed those attacks on Chinese cyber-espionage actors operating from leased VPS (virtual private servers) in the United States. The APT group has hit tens of thousands of organizations around the world, including targeted sectors like defense contractors, policy think tanks, and NGOs.
[ ALSO SEE: Multiple Exchange Server Zero-Days Under Attack ]
Microsoft also provided cover for a separate Internet Explorer vulnerability (CVE-2021-26411) that was used by North Korean government-backed hackers to target security researchers in South Korea.
The IE zero-day (Internet Explorer, interestingly, remains widely deployed in South Korea, was flagged by security vendor ENKI in February alongside a warning about drive-by browser IE downloads. Security researchers at Kaspersky have linked the attacks to a sub-group under Lazarus, the infamous North Korean threat actor known for launching destructive malware and ransomware attacks across the globe.
[ ALSO SEE: Google Chrome, Microsoft IE Zero-Days in Crosshairs ]
In all, Microsoft documented 89 distinct vulnerabilities across a range of software and cloud-delivered products in its portfolio. The patches cover serious flaws in multiple Windows OS components, Office and Office Services and Web Apps, SharePoint Server, Visual Studio, Azure and Azure Sphere.
Microsoft slapped a critical rating on 14 of the 89 documented vulnerabilities, while 75 carry an “important” severity rating.
According to Microsoft, two of these bugs are listed as publicly known while five are listed as under active attack at the time of release.
As usual, TippingPoint ZDI has a comprehensive wrap-up of this month’s Microsoft patch release.
RELATED: Google Warning: North Korean Gov Hackers Targeting Security Researchers
RELATED: Microsoft Server Hack Has Victims Hustling to Stop Intruders

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.
More from Ryan Naraine
- Comcast Wants a Slice of the Enterprise Cybersecurity Business
- VMware Confirms Exploit Code Released for Critical vRealize Logging Vulnerabilities
- Gem Security Gets $11 Million Seed Investment for Cloud Incident Response Platform
- Ransomware Leads to Nantucket Public Schools Shutdown
- Sentra Raises $30 Million for DSPM Technology
- Saviynt Raises $205M; Founder Rejoins as CEO
- OpenVEX Spec Adds Clarity to Supply Chain Vulnerability Warnings
- Tenable Launches $25 Million Early-Stage Venture Fund
Latest News
- Comcast Wants a Slice of the Enterprise Cybersecurity Business
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- New York Attorney General Fines Vendor for Illegally Promoting Spyware
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Cyber Insights 2023 | Zero Trust and Identity and Access Management
- Cyber Insights 2023 | The Coming of Web3
- European Police Arrest 42 After Cracking Covert App
