Microsoft 發布了安全性更新以應對數個影響 Microsoft 產品或元件的多個漏洞。有關安全性更新的列表,請參考以下網址:
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2021-Mar
有報告指 Internet Explorer (CVE-2021-26411) 及 Microsoft Edge (CVE-2021-21166 (Chromium-based) 及 CVE-2021-26411 (EdgeHTML-based)) 中的遠端執行程式碼漏洞正受到攻擊。此外,Windows Win32k 中權限提升漏洞的技術細節已被公開披露,因此該漏洞被攻擊的風險很高。系統管理員應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
Internet Explorer 9, 11
Microsoft Edge
Microsoft Windows 7, 8.1, RT 8.1, 10
Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019
Microsoft Windows Server, version 1909, version 2004, version 20H2
Microsoft Office 2010, 2013, 2016, 2019, 2019 for Mac
Microsoft Office Online Server
Microsoft Office Web Apps 2013, Server 2013
Microsoft Excel 2010, 2013, 2013 RT, 2016
Microsoft Powerpoint 2010, 2013, 2013 RT, 2016
Microsoft 365 Apps for Enterprise
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019
Microsoft Visual Studio 2017, 2019
Microsoft Visio 2010, 2013, 2016
Azure Container Instance, Kubernetes Service, Service Fabric, Sphere, Spring Cloud
HEVC Video Extensions
Microsoft Business Productivity Servers 2010 Service Pack 2
Microsoft Quantum Development Kit for Visual Studio Code
Microsoft Visual Studio Code ESLint extension
Power BI Report Server version 15.0.1103.234,15.0.1104.300
Visual Studio Code, Remote - Containers Extension, Java Extension Pack
Windows Admin Center
成功利用這些漏洞可以導致遠端執行程式碼、權限提升、泄漏資訊、服務受阻斷、繞過保安功能及篡改,視乎攻擊者利用哪個漏洞而定。
受影響產品的修補程式可在 Windows Update 或 Microsoft Update Catalog 獲取。受影響系統的用戶應遵從產品供應商的建議,立即採取行動以降低風險。
進一步資訊:
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2021-Mar
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-21166
https://www.hkcert.org/tc/security-bulletin/microsoft-monthly-security-update-march-2021-_20210310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1729
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24104
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26859 (to CVE-2021-26882)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26884 (to CVE-2021-26887)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26889 (to CVE-2021-26902)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27047 (to CVE-2021-27063)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27070
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27074 (to CVE-2021-27077)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27080 (to CVE-2021-27085)