Microsoft's Patch Tuesday Fixes Critical Vulnerabilities, Including Duqu 2.0 Exploit
Microsoft's latest Patch Tuesday addresses a range of critical vulnerabilities, including a Windows Kernel flaw exploited by Duqu 2.0, an advanced malware believed to be state-sponsored. The specific state behind Duqu 2.0 remains unidentified.
Among the eight bulletins released, four address Remote Code Execution (RCE) vulnerabilities. Internet Explorer (IE) tops the priority list, with 24 vulnerabilities patched in MS15-056, including 20 critical ones that could allow remote code execution.
Adobe Flash's patch APSB15-11 is also high priority, fixing 13 vulnerabilities, four of which are critical. Microsoft Word's MS15-059 addresses a vulnerability that can lead to RCE through a malicious file, making it the second priority.
The Duqu 2.0 malware, first blogged about by Eugene Kaspersky, bears resemblance to the original Duqu malware from 2011 and has received development efforts since then. Microsoft addressed the vulnerability exploited by Duqu 2.0 in MS15-061 this month. The specific state or country controlling Duqu 2.0 is not identified in the provided search results, but its advanced nature suggests nation-state backing.
With four RCE vulnerabilities patched this month, users are urged to prioritize updates, particularly for Internet Explorer and Adobe Flash. The Duqu 2.0 threat underscores the importance of staying vigilant against evolving, state-sponsored malware.