- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
Microsoft’s Patch Tuesday monthly security patches includes a critical patch for Microsoft’s Defender antivirus, which was reportedly exploited prior to this patch being release. Exploitation of this vulnerability will allow an attacker to execute malicious code on vulnerable devices, where Defender is installed.
Details at a glance: CVE-2021-1647
- This vulnerability has been exploited in the wild.
- Low or no privileges are required for attack success.
- User interaction is not required.
- There is a critical impact to confidentiality, availability, and integrity of exploited systems.
Mitigation Guidance
- Details of exploitation are extremely sparse while Microsoft’s guidance did indicate exploitation, no details as of yet have been provided.
- Microsoft reports proof of concept (POC) exploit code is reportedly available, and will likely be further developed and refined.
- Impacted versions of windows include: Windows 7 to Windows Server 2016
- A patch is available. Microsoft has released patches for all impacted operating systems.You should evaluate and prioritize patching critical systems. While the vector of this attack is considered “local” due to being file based, Microsoft Exchange and other public facing services should be prioritized to be patched first as they likely have the greatest exposure to exploitation.
For additional information on how to patch this vulnerability please refer to:
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1647
Erica Mixon
Erica is an award-winning writer, editor and journalist with over ten years of experience in the digital publishing industry. She holds a Bachelor’s degree in writing, literature and publishing from Emerson College. Her foray into technology began at TechTarget, where she provided editorial coverage on a wide variety...
More from the blog
View All Posts
Security Trends and Info
1 min read
| September 20, 2021
How To Go SOC-Less Without Slipping Up
Read More
Blumira News
5 min read
| September 30, 2021
Join Blumira on r/cybersecurity for a Reddit AMA
Read More
Security Trends and Info
6 min read
| January 14, 2022
2021 Wrap-Up: Cybersecurity By The Numbers
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.