The patches were organized in 13 security bulletins, three flagged as critical and ten as important. The critical bulletins, MS15-043, MS15-044 and MS15-045, cover remote code execution vulnerabilities in Windows, IE, Office, Microsoft .NET Framework, Microsoft Lync and Silverlight.
The priority for administrators should be MS15-043 which fixes 22 vulnerabilities in Internet Explorer, of which 14 are rated critical, said Wolfgang Kandek, the CTO of security firm Qualys, via email. Critical vulnerabilities in IE allow attackers to execute arbitrary code on machines when their users visit malicious Web pages, and attackers have a variety of techniques in their arsenal to achieve this, he said.
However, not all remote code execution vulnerabilities end up being exploited by criminals. Last year, only five percent of such vulnerabilities were targeted in real attacks.
"The difficulty is predicting which 5 percent," Kandek said. "I think it makes sense to look at the past to see what got attacked and what vulnerabilities are covered in exploit packs and prepare accordingly."
Next on the list of priorities should be MS15-044 because it fixes two vulnerabilities in a font parsing library used by many Microsoft products. Attackers could exploit these flaws by embedding a specially crafted font in documents or Web pages.
"Patch quickly, in less than two weeks if you can," Kandek said.
One reason for that is that criminals are quicker than ever to adopt exploits for popular programs, especially reliable ones they can use at scale. But companies should also start to get used to an accelerated patch tempo because Microsoft plans to push out updates for Windows 10 as they're ready instead of on a fixed schedule.
Companies will get the option to delay those updates for some systems by using a new service called Windows Update for Business. However, once a security patch reaches consumer deployments, the vulnerabilities it fixes are essentially revealed.
It's been known for a long time that attackers can reverse engineer patches to figure out where the bugs are and how to exploit them, so companies might not have the luxury of delaying patches for too long.