{"id":1827,"date":"2021-05-12T13:32:26","date_gmt":"2021-05-12T08:02:26","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1827"},"modified":"2021-06-07T11:28:25","modified_gmt":"2021-06-07T05:58:25","slug":"microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/","title":{"rendered":"Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws!"},"content":{"rendered":"\n<p>On 11th May 2021, Microsoft released another patch that is capable to fix 3 Zero-Day vulnerabilities and 55 other flaws present, 4 are very critical and 1 is moderate and the other 50 are classified as important.<\/p>\n\n\n\n<p>However, these 3 Zero-Day vulnerabilities that were fixed in the patch will not be used by the attackers, and to know in detail about these non-security Windows updates users can read about KB5003169 &amp; KB5003173 cumulative Windows 10 updates.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Which 3 Zero-Day Vulnerabilities are Fixed?<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"856\" height=\"400\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/microsoft-releasesed-update-image.jpg\" alt=\"Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws!\" class=\"wp-image-1829\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/microsoft-releasesed-update-image.jpg 856w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/microsoft-releasesed-update-image-300x140.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/microsoft-releasesed-update-image-768x359.jpg 768w\" sizes=\"(max-width: 856px) 100vw, 856px\" \/><\/figure><\/div>\n\n\n\n<p>In this updated patch, Microsoft fixed three zero-day vulnerabilities, these are publicly disclosed but not been exploited by any attackers are described below;<\/p>\n\n\n\n<ul><li><strong>CVE-2021-31204: <\/strong>Known as .NET and Visual Studio Elevation of Privilege Vulnerability<\/li><li><strong>CVE-2021-31207: <\/strong>Classified as Microsoft Exchange Server Security Feature Overlaps Bug<\/li><li><strong>CVE-2021-31200: <\/strong>Called as Common Utilities Remote Code Execution Vulnerability<\/li><\/ul>\n\n\n\n<p>However, the CVE-2021-31207 Microsoft Exchange Vulnerabilities are used in the 2021 Pwn2Own hacking challenge and it is still not cleared that the vulnerabilities are leaked or disclosed yet. But for now, none of the zero days are exploited.<\/p>\n\n\n\n<p>The experts are also aware that the attackers will able to analyze these patches to create exploits these vulnerabilities and particularly on Microsoft Exchange and it also important to occupies the security updates asap.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Other Companies are Doing?<\/strong><\/h2>\n\n\n\n<p>Multiple organizations also released multiple updates that are described below;<\/p>\n\n\n\n<ul><li>Apple released security updates for macOS, iOS, watchOS, and Safari are also released patched for vulnerabilities that go wild<\/li><li>Vmware published a security update in May<\/li><li>SAP released their security updates<\/li><li>Adobe delivered security updates for Adobe Creative Cloud Desktop, Framemaker, and Connect<\/li><li>Android may security updates released last week<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Which type of Vulnerabilities are Patched in May 2021?<\/strong><\/h3>\n\n\n\n<p>Meanwhile, the experts shared the complete list of vulnerabilities and released advisories in May 2021 Patch Tuesday update while accessing the complete description of every vulnerability that affects the system.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET Core &amp; Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31204\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31204<\/a><\/td><td>.NET and Visual Studio Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>HTTP.sys<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31166\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31166<\/a><\/td><td>HTTP Protocol Stack Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Internet Explorer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26419\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26419<\/a><\/td><td>Scripting Engine Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Jet Red and Access Connectivity<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28455\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-28455<\/a><\/td><td>Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Accessibility Insights for Web<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31936\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31936<\/a><\/td><td>Microsoft Accessibility Insights for Web Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31182\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31182<\/a><\/td><td>Microsoft Bluetooth Driver Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Dynamics Finance &amp; Operations<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28461\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-28461<\/a><\/td><td>Dynamics Finance and Operations Cross-site Scripting Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31195\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31195<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31209\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31209<\/a><\/td><td>Microsoft Exchange Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31207\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31207<\/a><\/td><td>Microsoft Exchange Server Security Feature Bypass Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Exchange Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31198\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31198<\/a><\/td><td>Microsoft Exchange Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31170\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31170<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31188\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31188<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31176\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31176<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31175\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31175<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31177\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31177<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31179\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31179<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31178\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31178<\/a><\/td><td>Microsoft Office Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31174\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31174<\/a><\/td><td>Microsoft Excel Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28478\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-28478<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31181\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31181<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26418\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26418<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28474\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-28474<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31171\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31171<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31173\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31173<\/a><\/td><td>Microsoft SharePoint Server Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31172\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31172<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31180\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31180<\/a><\/td><td>Microsoft Office Graphics Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31192\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31192<\/a><\/td><td>Windows Media Foundation Core Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28465\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-28465<\/a><\/td><td>Web Media Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows IrDA<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31184\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31184<\/a><\/td><td>Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Open Source Software<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31200\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31200<\/a><\/td><td>Common Utilities Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28476\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-28476<\/a><\/td><td>Hyper-V Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Skype for Business and Microsoft Lync<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26422\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26422<\/a><\/td><td>Skype for Business and Lync Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Skype for Business and Microsoft Lync<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26421\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-26421<\/a><\/td><td>Skype for Business and Lync Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27068\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-27068<\/a><\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31214\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31214<\/a><\/td><td>Visual Studio Code Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31211\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31211<\/a><\/td><td>Visual Studio Code Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31213\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31213<\/a><\/td><td>Visual Studio Code Remote Containers Extension Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Container Isolation FS Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31190\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31190<\/a><\/td><td>Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Container Manager Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31168\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31168<\/a><\/td><td>Windows Container Manager Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Container Manager Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31169\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31169<\/a><\/td><td>Windows Container Manager Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Container Manager Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31208\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31208<\/a><\/td><td>Windows Container Manager Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Container Manager Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31165\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31165<\/a><\/td><td>Windows Container Manager Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Container Manager Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31167\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31167<\/a><\/td><td>Windows Container Manager Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28479\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-28479<\/a><\/td><td>Windows CSC Service Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Desktop Bridge<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31185\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31185<\/a><\/td><td>Windows Desktop Bridge Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows OLE<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31194\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31194<\/a><\/td><td>OLE Automation Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows Projected File System FS Filter<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31191\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31191<\/a><\/td><td>Windows Projected File System FS Filter Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows RDP Client<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31186\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31186<\/a><\/td><td>Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SMB<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31205\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31205<\/a><\/td><td>Windows SMB Client Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows SSDP Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31193\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31193<\/a><\/td><td>Windows SSDP Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31187\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2021-31187<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Networking<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-24588\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-24588<\/a><\/td><td>Windows Wireless Networking Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Networking<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-24587\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-24587<\/a><\/td><td>Windows Wireless Networking Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Networking<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-26144\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2020-26144<\/a><\/td><td>Windows Wireless Networking Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>On 11th May 2021, Microsoft released another patch that is capable to fix 3 Zero-Day vulnerabilities and 55 other flaws present, 4 are very critical and 1 is moderate and the other 50 are classified as important. However, these 3 Zero-Day vulnerabilities that were fixed in the patch will not be used by the attackers, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1830,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[15],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"On 11th May 2021, Microsoft released another patch that is capable to fix 3 Zero-Day vulnerabilities and 55 other flaws present, 4 are very critical and 1 is moderate and the other 50 are classified as important. However, these 3 Zero-Day vulnerabilities that were fixed in the patch will not be used by the attackers, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-12T08:02:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T05:58:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/microsoft-releasesed-update-featured-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws!\",\"datePublished\":\"2021-05-12T08:02:26+00:00\",\"dateModified\":\"2021-06-07T05:58:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/\"},\"wordCount\":1042,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Infosec News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/\",\"url\":\"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/\",\"name\":\"Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-05-12T08:02:26+00:00\",\"dateModified\":\"2021-06-07T05:58:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws! - Xiarch Solutions Private Limited","og_description":"On 11th May 2021, Microsoft released another patch that is capable to fix 3 Zero-Day vulnerabilities and 55 other flaws present, 4 are very critical and 1 is moderate and the other 50 are classified as important. However, these 3 Zero-Day vulnerabilities that were fixed in the patch will not be used by the attackers, [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-05-12T08:02:26+00:00","article_modified_time":"2021-06-07T05:58:25+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/05\/microsoft-releasesed-update-featured-image.png","type":"image\/png"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws!","datePublished":"2021-05-12T08:02:26+00:00","dateModified":"2021-06-07T05:58:25+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/"},"wordCount":1042,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Infosec News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/","url":"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/","name":"Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-05-12T08:02:26+00:00","dateModified":"2021-06-07T05:58:25+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/microsoft-released-may-update-that-fixed-3-zero-days-and-55-flaws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Released May Update that Fixed 3 Zero-Days and 55 Flaws!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1827"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1827"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1827\/revisions"}],"predecessor-version":[{"id":1831,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1827\/revisions\/1831"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1830"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}