Microsoft released its monthly security update on Tuesday the 9th of November 2021, remediating 55 vulnerabilities across its products. Six of the vulnerabilities are considered to be critical, but in particular, Microsoft have reported that they have seen active exploitation of two vulnerabilities addressed within this rollup. The remaining vulnerabilities have been rated as important.
CVE-2021-42321 relates to a remote code execution (RCE) vulnerability in Exchange Server. In order for an attacker to exploit the vulnerability, they need to need to be able to authenticate with the service, so these are not as severe as the very commonly exploited ‘ProxyShell’ and ‘ProxyLogon’ vulnerabilities. See the reference provided for identifying whether the vulnerability has been exploited, which can be performed after installing the update.
The other vulnerability that has been observed to be exploited in the wild is CVE-2021-42292, which correlates to a security bypass in Microsoft Excel that allows remote code execution on both Windows and MacOS operating systems. A patch does not appear to be available for MacOS at this time.
The update also includes four hotfixes for Active Directory, one of which (KB5008380) has been highlighted to potentially cause issues in June 2022 if inconsistent patching is in effect across Domain Controllers.
See list for breakdown of all vulnerabilities identified in this security update: Microsoft November 2021 Patch Tuesday (sans.edu)