The latest information on road closures, construction delays, changes to operating status, or other unusual events on campus.
Security Alert - Microsoft Remote Code HTTP Vulnerability
Microsoft disclosed vulnerability: CVE-2021-31166 - HTTP Protocol Stack Remote Code Execution. This vulnerability could allow an unauthenticated attacker to execute arbitrary code on a system. Updates are available and should be installed immediately. This vulnerability affects the following Windows versions: Windows 10 Version 20H2 for 32-bit Systems Windows 10 Version 20H2 for x64-based Systems Windows 10 Version 2004 for 32-bit Systems Windows 10 Version 2004 for x64-based Systems Windows Server, version 20H2 (Server Core Installation) Windows Server, version 2004 (Server Core installation) Windows 10 Version 20H2 for ARM64-based Systems Windows 10 Version 2004 for ARM64-based Systems For managed endpoint customers, updates are available for install and will be required to be installed by Friday, May 14th. Non-managed endpoint customers should follow their unit's normal update procedures or download the updates direct from Microsoft. External links: https://msr
Security Alert - Adobe Reader and Acrobat Vulnerabilities
Adobe announced a series of vulnerabilities for Adobe Reader and Acrobat. Updates to mitigate the vulnerabilities have been released by Adobe, please update all computers using these applications. Vulnerability: CVE-2021-28550 is being actively exploited. More information on the series of vulnerabilities can be found at Adobe's website in the link below. Currently, CVE-2021-28550 has been reported to being exploited in the wild. It is an arbitrary code execution vulnerability affecting Windows systems using Adobe Reader. It is described as a "use-after-free" memory corruption issue. For managed endpoint customers, updates are available in the Windows software center as well as the MacOS Self Service portals. Non-managed endpoint customers should follow their unit's normal update procedures or download the updates direct from Adobe. External links: https://helpx.adobe.com/security/products/acrobat/apsb21-29.html