{"id":642,"date":"2021-01-15T04:22:58","date_gmt":"2021-01-14T22:52:58","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=642"},"modified":"2021-06-07T10:29:11","modified_gmt":"2021-06-07T04:59:11","slug":"microsoft-january-patch-fixed-1-zero-day-and-82-flaws","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/","title":{"rendered":"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws!"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">Microsoft ultimately issued its first security patch of 2021, which addresses more than 82 flaws present in about 12 services and also includes an active exploit zero-day vulnerability.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">In this latest patch, 10 bugs are taken as critical and more than 72 bugs are listed as important for services. This updates security patch covers the flaws of Microsoft Windows, ChakraCore, Microsoft Office Services, Web Apps, Visual Studio, NET Core, ASP. NET, Visual Studio, and many others.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The most critical issue founded is Microsoft Defender is RCE (remote code execution) that permits the hackers to infect the targeted systems with an arbitrary code.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Whereas Microsoft Malware Protection Engine (mpengine.dll) provides the scanning, cleaning, and detection capabilities for Microsoft Defender antispyware software program. The version affected by this flaw is 1.1.17600.5 and this bug is addressed in version 1.1.17700.4.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"889\" height=\"627\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/01\/microsoft-released-patch-blog-image-1.jpg\" alt=\"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws\" class=\"wp-image-643\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/01\/microsoft-released-patch-blog-image-1.jpg 889w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/01\/microsoft-released-patch-blog-image-1-300x212.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/01\/microsoft-released-patch-blog-image-1-768x542.jpg 768w\" sizes=\"(max-width: 889px) 100vw, 889px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">The addressed bug is activated and wild in nature, it is work as the zero-click flaw that can be exploited into the system with any interaction with the user, it details are scary on how it gets spread and exploited.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Microsoft experts say that the technique is not fully functional in all types of situations and the exploit is still considered to be a proof-of-concept, along with various updates requires for working.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Vulnerability Fixed By Security Update 2021<\/strong>!<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"716\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/01\/microsoft-released-patch-blog-image-2-1024x716.jpg\" alt=\"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws!\" class=\"wp-image-648\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/01\/microsoft-released-patch-blog-image-2-1024x716.jpg 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/01\/microsoft-released-patch-blog-image-2-300x210.jpg 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/01\/microsoft-released-patch-blog-image-2-768x537.jpg 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/01\/microsoft-released-patch-blog-image-2.jpg 1042w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">According to the senior director of product management and security said that; the organizations that are configured with automatic updates, don&#8217;t need to take any action, as the threat actor will try to evade the protection of the system and will block the engine updates automatically.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Many experts said that the flaw is already resolved by the automatic updates by Malware Protection Engine which released over a month or when it required a patch to fix a new vulnerability discovered.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Microsoft also fixed both publicly disclosed vulnerability and zero-day in this security update. They also released the patch of zero-day RCE vulnerability with CVE-2021-1647.<\/p><\/p>\n\n\n\n<p>Microsoft also patched the vulnerability disclosed publicly by Google under CVE-2020-0986. Look out for this table below to know about the patched in detail.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><th><strong>Tag<\/strong><\/th><th><strong>CVE ID<\/strong><\/th><th><strong>CVE Title<\/strong><\/th><th><strong>Severity<\/strong><\/th><\/tr><tr><td>.NET Repository<br><\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1725\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1725<\/a><\/td><td>Bot Framework SDK Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><td>ASP.NET core &amp; .NET core<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1723\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1723<\/a><\/td><td>ASP.NET Core and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Active Directory Pod Identity<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1677\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1677<\/a><\/td><td>Azure Active Directory Pod Identity Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1683\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1683<\/a><\/td><td>Windows Bluetooth Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1638\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1638<\/a><\/td><td>Windows Bluetooth Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Bluetooth Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1684\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1684<\/a><\/td><td>Windows Bluetooth Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft DTV-DVD Video Decoder<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1668\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1668<\/a><\/td><td>Microsoft DTV-DVD Video Decoder Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Edge (HTML-based)<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1705\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1705<\/a><\/td><td>Microsoft Edge (HTML-based) Memory Corruption Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1709\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1709<\/a><\/td><td>Windows Win32k Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1696\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1696<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1665\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1665<\/a><\/td><td>GDI+ Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1708\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1708<\/a><\/td><td>Windows GDI+ Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Malware Protection Engine<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1647\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1647<\/a><\/td><td>Microsoft Defender Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1713\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1713<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1714\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1714<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1711\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1711<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1715\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1715<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1716\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1716<\/a><\/td><td>Microsoft Word Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1712\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1712<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1707\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1707<\/a><\/td><td>Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1718\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1718<\/a><\/td><td>Microsoft SharePoint Server Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1717\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1717<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1719\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1719<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1641\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1641<\/a><\/td><td>Microsoft SharePoint Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft RPC<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1702\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1702<\/a><\/td><td>Windows Remote Procedure Call Runtime Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1649\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1649<\/a><\/td><td>Active Template Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1676\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1676<\/a><\/td><td>Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1689\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1689<\/a><\/td><td>Windows Multipoint Management Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1657\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1657<\/a><\/td><td>Windows Fax Compose Form Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1646\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1646<\/a><\/td><td>Windows WLAN Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1650\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1650<\/a><\/td><td>Windows Runtime C++ Template Library Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1706\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1706<\/a><\/td><td>Windows LUAFV Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1699\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1699<\/a><\/td><td>Windows (modem. sys) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1644\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1644<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Codecs Library<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1643\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1643<\/a><\/td><td>HEVC Video Extensions Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Microsoft Windows DNS<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1637\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1637<\/a><\/td><td>Windows DNS Query Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>SQL Server<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1636\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1636<\/a><\/td><td>Microsoft SQL Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-26870\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-26870<\/a><\/td><td>Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows AppX Deployment Extensions<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1642\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1642<\/a><\/td><td>Windows AppX Deployment Extensions Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows AppX Deployment Extensions<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1685\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1685<\/a><\/td><td>Windows AppX Deployment Extensions Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CryptoAPI<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1679\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1679<\/a><\/td><td>Windows CryptoAPI Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1652\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1652<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1654\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1654<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1659\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1659<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1653\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1653<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1655\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1655<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1693\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1693<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows CSC Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1688\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1688<\/a><\/td><td>Windows CSC Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Diagnostic Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1680\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1680<\/a><\/td><td>Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Diagnostic Hub<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1651\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1651<\/a><\/td><td>Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows DP API<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1645\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1645<\/a><\/td><td>Windows Docker Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Logging Service<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1703\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1703<\/a><\/td><td>Windows Event Logging Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Event Tracing<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1662\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1662<\/a><\/td><td>Windows Event Tracing Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1691\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1691<\/a><\/td><td>Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1704\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1704<\/a><\/td><td>Windows Hyper-V Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1692\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1692<\/a><\/td><td>Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1661\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1661<\/a><\/td><td>Windows Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Installer<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1697\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1697<\/a><\/td><td>Windows InstallService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1682\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1682<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Media<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1710\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1710<\/a><\/td><td>Microsoft Windows Media Foundation Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTLM<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1678\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1678<\/a><\/td><td>NTLM Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1695\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1695<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Projected File System Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1663\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1663<\/a><\/td><td>Windows Projected File System FS Filter Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Projected File System Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1672\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1672<\/a><\/td><td>Windows Projected File System FS Filter Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Projected File System Filter Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1670\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1670<\/a><\/td><td>Windows Projected File System FS Filter Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1674\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1674<\/a><\/td><td>Windows Remote Desktop Protocol Core Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1669\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1669<\/a><\/td><td>Windows Remote Desktop Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1701\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1701<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1700\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1700<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1666\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1666<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1664\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1664<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1671\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1671<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1673\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1673<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1658\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1658<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1667\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1667<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows Remote Procedure Call Runtime<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1660\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1660<\/a><\/td><td>Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/td><td><strong>Critical<\/strong><\/td><\/tr><tr><td>Windows splwow64<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1648\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1648<\/a><\/td><td>Microsoft splwow64 Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows TPM Device Driver<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1656\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1656<\/a><\/td><td>TPM Device Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Update Stack<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1694\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1694<\/a><\/td><td>Windows Update Stack Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1686\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1686<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1681\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1681<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1690\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1690<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows WalletService<\/td><td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-1687\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-1687<\/a><\/td><td>Windows WalletService Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><p style=\"text-align: justify\">On the other hand, the vulnerability fixed by Microsoft is memory corruption flaws the was discovered in Microsoft Edge Browser as CVE-2021-1705, along with that a Windows Remote Desktop Protocol was overlapping the flaw as CVE-2021-1674.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft ultimately issued its first security patch of 2021, which addresses more than 82 flaws present in about 12 services and also includes an active exploit zero-day vulnerability. In this latest patch, 10 bugs are taken as critical and more than 72 bugs are listed as important for services. This updates security patch covers the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":646,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Microsoft ultimately issued its first security patch of 2021, which addresses more than 82 flaws present in about 12 services and also includes an active exploit zero-day vulnerability. In this latest patch, 10 bugs are taken as critical and more than 72 bugs are listed as important for services. This updates security patch covers the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-14T22:52:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T04:59:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/01\/Microsoft-Patch-Tuesday-Featured-Image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws!\",\"datePublished\":\"2021-01-14T22:52:58+00:00\",\"dateModified\":\"2021-06-07T04:59:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/\"},\"wordCount\":1466,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Vulnerabilities\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/\",\"url\":\"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/\",\"name\":\"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-01-14T22:52:58+00:00\",\"dateModified\":\"2021-06-07T04:59:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws! - Xiarch Solutions Private Limited","og_description":"Microsoft ultimately issued its first security patch of 2021, which addresses more than 82 flaws present in about 12 services and also includes an active exploit zero-day vulnerability. In this latest patch, 10 bugs are taken as critical and more than 72 bugs are listed as important for services. This updates security patch covers the [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-01-14T22:52:58+00:00","article_modified_time":"2021-06-07T04:59:11+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/01\/Microsoft-Patch-Tuesday-Featured-Image.png","type":"image\/png"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws!","datePublished":"2021-01-14T22:52:58+00:00","dateModified":"2021-06-07T04:59:11+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/"},"wordCount":1466,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Vulnerabilities"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/","url":"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/","name":"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-01-14T22:52:58+00:00","dateModified":"2021-06-07T04:59:11+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/microsoft-january-patch-fixed-1-zero-day-and-82-flaws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft January Patch Fixed 1 Zero-Day and 82 Flaws!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/642"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=642"}],"version-history":[{"count":6,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/642\/revisions"}],"predecessor-version":[{"id":651,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/642\/revisions\/651"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/646"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}