Two of the patched flaws are already being exploited and three have been publicly disclosed Credit: Gordon Mah Ung Microsoft has patched 68 vulnerabilities in Windows, Office, Edge, Internet Explorer and SQL Server, two of which have already been exploited by attackers and three that have been publicly disclosed.The patches are covered in 14 security bulletins, one dedicated to Adobe Flash Player which is upgraded through Windows Update in Windows 10 and 8.1. Six of the bulletins are rated critical and eight are rated important.Administrators should prioritize the Windows patches in the MS16-135 bulletin, because they address a zero-day vulnerability that’s already being exploited by a group of attackers known in the security industry as Fancy Bear, APT28 or Strontium.The vulnerability, tracked as CVE-2016-7255, was publicly disclosed by Google last week, only 10 days after notifying Microsoft about it. This caused a bit of friction between the two companies. Google gives vendors only seven days to fix vulnerabilities or to publish mitigation advice if those flaws are found to be exploited in active attacks. Microsoft disagrees with that policy and feels that Google’s decision to make details about this vulnerability public put customers at increased risk.Another Windows security bulletin that should be prioritized is MS16-132. It’s rated critical and fixes multiple remote code execution vulnerabilities, including another zero-day flaw that, according Microsoft, is already being exploited by attackers. The vulnerability is located in the Windows font library and can be exploited through specially crafted fonts embedded into websites or documents. Successful exploitation allows attackers to take full control of the affected systems, Microsoft said in the security bulletin.Three other critical vulnerabilities in Internet Explorer and Edge, covered in the MS16-142 and MS16-129 bulletins, have been publicly disclosed before being patched. However, according to Microsoft they haven’t been exploited in attacks yet.The Office security bulletin, MS16-133, is rated as important, but covers remote code execution vulnerabilities that can be exploited through specially crafted documents.“Since Office documents are prevalent in typical corporate environments I think this bulletin should be treated as critical even if it is rated as ‘Important’,” said Amol Sarwate, director of the Vulnerability Labs at security vendor Qualys, in an analysis of the patches.Microsoft SQL Server administrators should prioritize the MS16-136 bulletin which covers vulnerabilities in the RDBMS engine, MDS API, SQL Analysis Services and the SQL Server Agent.“SQL Server vulnerabilities are relatively rare and although there is no remote code execution, attackers can gain elevated privileges which could allow them to view, change, or delete data and create new accounts,” Sarwate said. Related content news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Cyberattacks Vulnerabilities news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe