Skip to content

Microsoft's Patch Tuesday Fixes Critical Vulnerabilities, Including Duqu 2.0 Exploit

Microsoft patches critical flaws in Windows, IE, and Adobe Flash. The Duqu 2.0 malware, believed to be state-sponsored, highlights the need for vigilance against evolving cyber threats.

This is a picture of a screen , where there are some icons , and there is a popup message on it.
This is a picture of a screen , where there are some icons , and there is a popup message on it.

Microsoft's Patch Tuesday Fixes Critical Vulnerabilities, Including Duqu 2.0 Exploit

Microsoft's latest Patch Tuesday addresses a range of critical vulnerabilities, including a Windows Kernel flaw exploited by Duqu 2.0, an advanced malware believed to be state-sponsored. The specific state behind Duqu 2.0 remains unidentified.

Among the eight bulletins released, four address Remote Code Execution (RCE) vulnerabilities. Internet Explorer (IE) tops the priority list, with 24 vulnerabilities patched in MS15-056, including 20 critical ones that could allow remote code execution.

Adobe Flash's patch APSB15-11 is also high priority, fixing 13 vulnerabilities, four of which are critical. Microsoft Word's MS15-059 addresses a vulnerability that can lead to RCE through a malicious file, making it the second priority.

The Duqu 2.0 malware, first blogged about by Eugene Kaspersky, bears resemblance to the original Duqu malware from 2011 and has received development efforts since then. Microsoft addressed the vulnerability exploited by Duqu 2.0 in MS15-061 this month. The specific state or country controlling Duqu 2.0 is not identified in the provided search results, but its advanced nature suggests nation-state backing.

With four RCE vulnerabilities patched this month, users are urged to prioritize updates, particularly for Internet Explorer and Adobe Flash. The Duqu 2.0 threat underscores the importance of staying vigilant against evolving, state-sponsored malware.

Read also:

Latest