Microsoft patches eight security flaws
Microsoft uses its monthly patching day to explain why it takes so long to fix some security flaws.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Microsoft has defended the time it takes to fix known security flaws, as it released patches for eight vulnerabilities.
Of the eight patches, which are part of Microsoft's monthly update cycle, five are rated critical, two are important and the last is moderate.
The first patch fixes a critical flaw in Excel, which has already been publicly exploited, Microsoft researchers said in their security blog. The second patch solves another already-exploited flaw in Word Pad and Office.
The other critical fixes are for Internet Explorer, Windows HTTP Services and DirectX. The two important bulletins fix a token kidnapping flaw in Windows and a spoofing vulnerability in ISA Server. The last, least serious flaw being patched is an elevation of privilege issue in SearchPoint.
On it's blog, the Microsoft security team noted that five of the vulnerabilities were previously made public some as early as April of last year. The team wrote that Microsoft sometimes takes a while to issue a security update because they want to make sure the vulnerability is fully addressed and compatible with third party software.
"I will say that we will do the right thing for our customers; we will dig deeper; we will hold a low quality update; and we will release an update when it is ready for broad distribution; no sooner or no later," the post said.
More details on the security patches are available here.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Freelance journalist Nicole Kobie first started writing for ITPro in 2007, with bylines in New Scientist, Wired, PC Pro and many more.
Nicole the author of a book about the history of technology, The Long History of the Future.
-
Surging third-party risks create software vulnerability headaches for developer teamsNews Security risk is increasing across the software delivery lifecycle as development relies more heavily on third-party components
-
"If it would go away tomorrow, I wouldn't even notice it": is there a future for Stack Overflow in software engineering?In-depth Even as developers turn their backs on the coding platform, its CEO insists there is life beyond the Q&A format
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Vulnerability management complexity is leaving enterprises at serious riskNews Fragmented data and siloed processes mean remediation is taking too long
-
Beat cyber criminals at their own gameWhitepaper A guide to winning the vulnerability race and protection your organization
-
Same cyberthreat, different storyWhitepaper How security, risk, and technology asset management teams collaborate to easily manage vulnerabilities
-
Three steps to transforming security operationsWhitepaper How to be more agile, effective, collaborative, and scalable
-
Should your business start a bug bounty program?In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too?
-
Accessing the XDR realmWhitepaper A guide for MSPs to unleash modern security
