Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2023-6080

Description: Written By: Jacob Paullus, Daniel McNamara, Jake Rawlins, Steven Karschnia Executive Summary Mandiant exploited flaws in the Microsoft Software Installer (MSI) repair action of Lakeside Software's SysTrack installer to obtain arbitrary code execution. An attacker with low-privilege access to a system running the vulnerable version of SysTrack could escalate privileges locally. Mandiant responsibly disclosed this vulnerability to Lakeside Software, and the issue has been addressed in version 11.0. Introduction Building upon the insights shared in a previous Mandiant blog post, Escalating Privileges via Third-Party Windows Installers, this case study explores the ongoing challenge of securing third-party Windows installers. These vulnerabilities are rooted in insecure coding practices when creating Microsoft Software Installer (MSI) Custom Actions and can be caused by references to missing files, broken shortcuts, or insecure folder permissions. These oversights create gaps that inadvertently allow attackers the ability to escalate privileges. As covered in our previous blog post, after software is installed with an MSI file, Windows caches the MSI file in the C:\Windows\Installer folder for later use. This allows users on the system to access and use the "repair" feature, which is intended to address various issues that may be impacting the installed software. During execution of an MSI repair, several operations (such as file creation or execution) may be triggere...
Source: Google Threat Intelligence
February 3rd, 2025 (3 months ago)
Description: Cybersecurity researchers have discovered a malvertising campaign that's targeting Microsoft advertisers with bogus Google ads that aim to take them to phishing pages that are capable of harvesting their credentials. "These malicious ads, appearing on Google Search, are designed to steal the login information of users trying to access Microsoft's advertising platform," Jérôme Segura, senior
Source: TheHackerNews
February 1st, 2025 (3 months ago)
Description: ​Microsoft says it improved the contrast of text rendered in all Chromium-based web browsers on Windows, making it more readable on some displays. [...]
Source: BleepingComputer
January 31st, 2025 (3 months ago)
Description: Microsoft has removed a safeguard hold that prevented devices with Auto HDR enabled from installing the Windows 11 2024 Update due to gaming issues. [...]
Source: BleepingComputer
January 30th, 2025 (3 months ago)

CVE-2025-21415

Description: Authentication bypass by spoofing in Azure AI Face Service allows an authorized attacker to elevate privileges over a network.

CVSS: CRITICAL (9.9)

EPSS Score: 0.09%

Source: CVE
January 30th, 2025 (3 months ago)

CVE-2025-21396

Description: Missing authorization in Microsoft Account allows an unauthorized attacker to elevate privileges over a network.

CVSS: HIGH (7.5)

EPSS Score: 0.09%

Source: CVE
January 30th, 2025 (3 months ago)
Description: While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.
Source: Dark Reading
January 30th, 2025 (3 months ago)
Description: Microsoft is investigating an ongoing outage preventing users and admins from accessing some Microsoft 365 services and the admin center. [...]
Source: BleepingComputer
January 29th, 2025 (3 months ago)
Description: Microsoft has started force-installing the new Outlook email client on Windows 10 systems for users who deploy this month's KB5050081 non-security preview update. [...]
Source: BleepingComputer
January 29th, 2025 (3 months ago)
Description: ​Microsoft has released the optional KB5050094 Preview cumulative update for Windows 11 24H2 with 28 bug fixes and changes, including fixes for bugs causing audio playback issues on systems with USB audio device drivers. [...]
Source: BleepingComputer
January 29th, 2025 (3 months ago)