At the Patchday in February, Microsoft supplies among other things .Net Framework, Exchange Server, Windows Co. With important security patches. Users should ensure that Windows Update is active and the current patches are installed. Otherwise, attackers were able to complete systems completely in the worst case.
From important to critical
A weak point (CVE-2021-1732) use attackers currently. It concerns current Windows 10 versions. The error can be found in the system file Win32K. Successfully set the attacker at the LUCKE, they were able to get high user rights. The patch is as "important" classy.
Information about six more lights are publicly known. Attacks could be imminent accordingly. Of these, DIRECTX and Sysinternals are affected by PSEXEC. An attacker could leave DOS attacks exports or information left. The updates are with the classification "important" Mistake.
One of these lights (CVE-2021-26701) but is considered "critical". They are concerned .Net Core and Visual Studio. Here, attackers from afar without authentication could exported to non-closed paths.
For example, further critical vulnerabilities relate to Windows Fax Service, Windows Graphics Component and Windows DNS Server. Again, attackers were able to push and export systems from the distant harmful code to systems.
As fast as possible patch
In a post, Microsoft warns before the exploitation of three security swallows (CVE-2021-24074, CVE-2021-24094 and 24086) in the TCP / IP implementation of Windows. Two harmful code looks are as "critical" classy. But attacks should be comparatively complex. Microsoft calculates that there could be timely DOS attacks and recommends Windows users to get their system up to date.
The remaining security updates are as "important" and "moderate" classy. Among other things, they relate to Azure IoT, Defender and Excel. Here, for example, spoofing or maliciouscode attacks are conceivable.
A good overview of the currently closed security can be found, for example, in the blog of Trend Micros Zero Day initiative.