Trustwave SpiderLabs Uncovers Critical Cybersecurity Vulnerabilities Exposing Manufacturers to Costly Attacks. Learn More

Trustwave SpiderLabs Uncovers Critical Cybersecurity Vulnerabilities Exposing Manufacturers to Costly Attacks. Learn More

Managed Detection & Response

Eradicate cyberthreats with world-class intel and expertise

Managed Security Services

Expand your team’s capabilities and strengthen your security posture

Consulting & Professional Services

Tap into our global team of tenured cybersecurity specialists

Penetration Testing

Subscription- or project-based testing, delivered by global experts

Database Security

Get ahead of database risk, protect data and exceed compliance requirements

Email Security & Management

Catch email threats others miss with layered security & maximum control

Co-Managed SOC (SIEM)

Eliminate alert fatigue, focus your SecOps team, stop threats fast, and reduce cyber risk

Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
The Trustwave Approach
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Platform
SpiderLabs Fusion Center
Security Operations Centers
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Patch Tuesday, June 2021

Summer is officially here and with it June's Patch Tuesday. This is a surprisingly light month with only 49 CVEs being patched and only five of those rated as "Critical". The list of "Critical" includes a Remote Code Execution (RCE) Microsoft's anti-malware software, Defender. It's always a double hit when the software meant to protect your system ends up being a threat that can cause compromise. In addition, you'll find RCEs in the MS Scripting Engine, SharePoint, and VP9 Video Extensions on that list. Most concerning is an RCE vulnerability in the MSHTML Platform (CVE-2021-33742). This CVE has been publicly disclosed and exploited in the wild in targeted campaigns.

Public exploitation exists on the list of CVEs rated as "Important" too. This includes Privilege Escalation bugs in DVM Core (CVE-2021-33739), the Microsoft Enhanced Cryptographic Provider (CVE-2021-31199, CVE-2021-31201), and Windows NTFS Drivers (CVE-2021-31956). Lastly, an Information Disclosure vulnerability in the Windows Kernel (CVE-2021-31955) has also been discovered exploited in the wild.

All in all, while a relatively light month for patching, several of these vulnerabilities are being actively exploited. Despite exploitation likely being limited and targeted, the very fact that exploitation is occurring already puts administrators behind in patching. So there's no time to spare. Get to patching and stay safe!


Microsoft Defender Remote Code Execution Vulnerability
Remote Code Execution

Microsoft SharePoint Server Remote Code Execution Vulnerability
Remote Code Execution

Scripting Engine Memory Corruption Vulnerability
Remote Code Execution

VP9 Video Extensions Remote Code Execution Vulnerability
Remote Code Execution

Windows MSHTML Platform Remote Code Execution Vulnerability
Remote Code Execution


.NET Core and Visual Studio Denial of Service Vulnerability
Denial of Service

3D Viewer Information Disclosure Vulnerability
Information Disclosure

3D Viewer Remote Code Execution Vulnerability
CVE-2021-31942, CVE-2021-31943
Remote Code Execution

Event Tracing for Windows Information Disclosure Vulnerability
Information Disclosure

Kerberos AppContainer Security Feature Bypass Vulnerability
Security Feature Bypass

Microsoft Defender Denial of Service Vulnerability
Denial of Service

Microsoft DWM Core Library Elevation of Privilege Vulnerability
Elevation of Privilege

Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
CVE-2021-31199, CVE-2021-31201
Elevation of Privilege

Microsoft Excel Remote Code Execution Vulnerability
Remote Code Execution

Microsoft Intune Management Extension Remote Code Execution Vulnerability
Remote Code Execution

Microsoft Office Graphics Remote Code Execution Vulnerability
CVE-2021-31940, CVE-2021-31941
Remote Code Execution

Microsoft Outlook Remote Code Execution Vulnerability
Remote Code Execution

Microsoft SharePoint Server Information Disclosure Vulnerability
Information Disclosure

Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2021-26420, CVE-2021-31966
Remote Code Execution

Microsoft SharePoint Server Spoofing Vulnerability
CVE-2021-31948, CVE-2021-31950, CVE-2021-31964

Microsoft VsCode Kubernetes Tools Extension Elevation of Privilege Vulnerability
Elevation of Privilege

Paint 3D Remote Code Execution Vulnerability
CVE-2021-31945, CVE-2021-31946, CVE-2021-31983
Remote Code Execution

Server for NFS Denial of Service Vulnerability
Denial of Service

Server for NFS Information Disclosure Vulnerability
CVE-2021-31975, CVE-2021-31976
Information Disclosure

Windows Bind Filter Driver Information Disclosure Vulnerability
Information Disclosure

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Common Log File System Driver Elevation of Privilege Vulnerability
Elevation of Privilege

Windows DCOM Server Security Feature Bypass
Security Feature Bypass

Windows Filter Manager Elevation of Privilege Vulnerability
Elevation of Privilege

Windows GPSVC Elevation of Privilege Vulnerability
Elevation of Privilege

Windows HTML Platform Security Feature Bypass Vulnerability
Security Feature Bypass

Windows Hyper-V Denial of Service Vulnerability
Denial of Service

Windows Kernel Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Kernel Information Disclosure Vulnerability
Information Disclosure

Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Elevation of Privilege

Windows NTFS Elevation of Privilege Vulnerability
Elevation of Privilege

Windows NTLM Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Print Spooler Elevation of Privilege Vulnerability
Elevation of Privilege

Windows Remote Desktop Services Denial of Service Vulnerability
Denial of Service

Windows TCP/IP Driver Security Feature Bypass Vulnerability
Security Feature Bypass

Latest SpiderLabs Blogs

Trustwave SpiderLabs Report: LockBit 3.0 Ransomware Vs. the Manufacturing Sector

As the manufacturing sector continues its digital transformation, Operational Technology (OT), Industrial Control Systems (ICS), and Supervisory Control and Data Acquisition (SCADA) are becoming...

Read More

Overview of the Cyberwarfare used in Israel – Hamas War

On October 7, 2023, the Palestinian organization Hamas launched the biggest attack on Israel in years, resulting in numerous casualties and hostages taken. Israel responded with a large-scale ground...

Read More

The 2023 Retail Services Sector Threat Landscape: A Trustwave Threat Intelligence Briefing

The annual holiday shopping season is poised for a surge in spending, a fact well-known to retailers, consumers, and cybercriminals alike. The latter group, however, is poised to exploit any...

Read More