Weekly threat roundup: Windows, Chrome, VMware
Pulling together the most dangerous and pressing flaws that businesses need to patch


Patch management is far easier said than done, and security teams may often be forced into prioritising fixes for several business-critical systems, all released at once. It's become typical, for example, to expect dozens of patches to be released on Microsoft's Patch Tuesday, with other vendors also routinely getting in on the act.
Below, IT Pro has collated the most pressing disclosures from the last seven days, including details such as a summary of the exploit mechanism, and whether the vulnerability is being exploited in the wild. This is in order to give teams a sense of which bugs and flaws might pose the most dangerous immediate security risks.
Patch available for Chrome zero-day under attack
Google has fixed a vulnerability tracked as CVE-2021-30551, the sixth flaw in Chrome that's been exploited in 2021 so far.
The company has disclosed few details about the vulnerability, but it's been described as a type confusion flaw in the open source and C++ WebAssembly and JavaScript engine, V8. The same hackers exploiting this vulnerability, according to Project Zero researcher Shane Huntley, are also exploiting a Windows zero-day flaw also fixed by Microsoft this week.
Version 91.0.4472.101 of Chrome for Windows, Mac, and Linux is built to fix 14 different vulnerabilities, including the aforementioned bug that's been exploited.
Microsoft fixes 50 bugs in latest Patch Tuesday
Microsoft's latest round of Patch Tuesday vulnerability fixes has addressed 50 flaws, including six zero-days that are under attack.
The vulnerabilities that hackers are exploiting are CVE-2021-33742, CVE-2021-33739, CVE-2021-31199, CVE-2021-31201, CVE-2021-31955, and CVE-2021-31956.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
RELATED RESOURCE
The most severe, CVE-2021-33739, is described as an elevation of privilege flaw in Microsoft Desktop Window Manager Core Library and is rated 8.4 on the CVSS threat severity scale.
Both CVE-2021-31199 and CVE-2021-31201, meanwhile, are described as elevation of privilege flaws in the Microsoft Enhanced Cryptographic Provider component. These are both rated a modest 5.2 on the CVSS threat severity scale, but are nonetheless being used in attacks.
Details behind these exploits are scarce, but CVE-2021-33742, a remote code execution flaw in Windows MSHTML Platform, is being exploited by a commercial exploit company to target nation states in Eastern Europe and the Middle East.
'Mystery' malware steals 26 million passwords
Researchers with NordLocker have discovered that a massive 1.2TB trove of data containing login credentials, browser cookies, autofill data, and payment information has been stolen by an unknown malware strain.
A hacking group accidentally revealed the location of a database in which countless sensitive credentials and other data have been harvested from 3.2 million Windows devices. This data was collected by an unidentified malware strain between 2018 and 2020, with 400 million of the two billion cookies still valid at the time the database was discovered.
The cache also includes six million files taken from Desktop and Downloads folders, three million text files, 900,000 image files, and 600,000 Word files. The malware also generated screenshots to reveal the spread of illegal software, as well as photographs of a user if the device had a webcam.
The researchers have recommended that people refrain from using web browsers to store sensitive information, and instead adopt a dedicated password manager. Deleting cookies should also be a monthly habit, as well as not installing software from peer-to-peer networks.
Unpatched VMware deployments under attack
Cyber criminals are attempting to exploit a remote code execution flaw in VMware vCenter Server and VMware Cloud Foundation, according to the US Cybersecurity and Infrastructure Security Agency (CISA).
The vulnerability is tracked as CVE-2021-21985, and involves a lack of input validation in the Virtual SAN Health Check plugin, which is enabled by default in the system. The vSAN system is a software-defined storage platform that's used to eliminate the need for additional storage boxes using local server storage. The plugin allows users to run automated maintenance and various health checks.
Although VMware issued a patch for this flaw weeks ago, lackadaisical patching on the part of customers may lead to exploitation should detected attempts be successful, according to a warning issued by the agency.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd
-
The threat prevention buyer's guide
Whitepaper Find the best advanced and file-based threat protection solution for you
By ITPro
-
Supply chain as kill chain
Whitepaper Security in the era Zero Trust
By ITPro
-
Microsoft under fire for “negligent” security practices in scathing critique by industry exec
News Microsoft took more than 90 days to issue a partial fix for a critical Azure vulnerability, researchers found
By Ross Kelly
-
Apple patches zero day linked to spyware campaign
News Kaspersky researchers were the first to report a zero day used in a sophisticated attack chain
By Rory Bathgate
-
MOVEit cyber attack: Cl0p sparks speculation that it’s lost control of hack
News The hackers return with their second major data-extortion attack of 2023, but may have bitten off more than they can chew
By Connor Jones
-
Microsoft says it knows who was behind cyber attacks on MOVEit Transfer
Dozens of organizations may have already lost data to hackers exploiting the critical flaw
By Rory Bathgate
-
Trend Micro security predictions for 2023
Whitepaper Prioritise cyber security strategies on capabilities rather than costs
By ITPro
-
Windows, macOS, and Tesla exploits debuted at Pwn2Own hacking contest
News Researchers took home more than $375,000 in winnings on the first day of the competition
By Ross Kelly