Alert! Microsoft Fixes 60 Vulnerabilities With 2 Actively Exploited Zero-Days
Alert! Microsoft Fixes 60 Vulnerabilities With 2 Actively Exploited Zero-Days
In its May per chance per chance also 2024 Patch Tuesday unlock, Microsoft addressed 60 vulnerabilities, together with 2 zero-day vulnerabilities actively exploited within the wild.
The updates quilt an excessive amount of vulnerability classes.
- 27 Faraway Code Execution Vulnerabilities
- 17 Elevation of Privilege Vulnerabilities
- 7 Records Disclosure Vulnerabilities
- 4 Spoofing Vulnerabilities.
- 3 Denial of Service Vulnerabilities
- 2 Safety Feature Bypass Vulnerabilities
Zero-Day Vulnerabilities Addressed
Microsoft has patched two actively exploited zero-day vulnerabilities on this update:
CVE-2024-30040 – Windows MSHTML Platform Safety Feature Bypass Vulnerability
This flaw can also enable attackers to bypass OLE mitigations in Microsoft 365 and Microsoft Office.
An attacker need to accumulate the patron to load a malicious file onto a historical system by offering one thing tempting in an e-mail or immediate message. Then, they would need to accumulate the patron to swap the specially made file but no longer primarily open or click on on the malicious file.
Profitable exploitation requires convincing a consumer to open a malicious chronicle, doubtlessly main to arbitrary code execution.
CVE-2024-30051 – Windows DWM Core Library Elevation of Privilege Vulnerability
This vulnerability can also grant an attacker SYSTEM privileges on Windows devices. Most up-to-date Qakbot malware phishing attacks have exploited this flaw to construct elevated privileges.
Vlad Stolyarov and Benoit Sevens of Google Possibility Evaluation Neighborhood, Bryce Abdo, and Adam Brunner of Google Mandiant reported the vulnerability.
Checklist of 60 Vulnerabilities & Fixes:
Windows Assignment Scheduler | CVE-2024-26238 |
Microsoft Windows SCSI Class System File | CVE-2024-29994 |
Windows Common Log File System Driver | CVE-2024-29996 |
Windows Cell Broadband | CVE-2024-29997 |
Windows Cell Broadband | CVE-2024-29998 |
Windows Cell Broadband | CVE-2024-29999 |
Windows Cell Broadband | CVE-2024-30000 |
Windows Cell Broadband | CVE-2024-30001 |
Windows Cell Broadband | CVE-2024-30002 |
Windows Cell Broadband | CVE-2024-30003 |
Windows Cell Broadband | CVE-2024-30004 |
Windows Cell Broadband | CVE-2024-30005 |
Microsoft WDAC OLE DB provider for SQL | CVE-2024-30006 |
Microsoft Brokering File System | CVE-2024-30007 |
Windows DWM Core Library | CVE-2024-30008 |
Windows Routing and Faraway Access Service (RRAS) | CVE-2024-30009 |
Windows Hyper-V | CVE-2024-30010 |
Windows Hyper-V | CVE-2024-30011 |
Windows Cell Broadband | CVE-2024-30012 |
Windows Routing and Faraway Access Service (RRAS) | CVE-2024-30014 |
Windows Routing and Faraway Access Service (RRAS) | CVE-2024-30015 |
Windows Cryptographic Providers and products | CVE-2024-30016 |
Windows Hyper-V | CVE-2024-30017 |
Windows Kernel | CVE-2024-30018 |
Windows DHCP Server | CVE-2024-30019 |
Windows Cryptographic Providers and products | CVE-2024-30020 |
Windows Cell Broadband | CVE-2024-30021 |
Windows Routing and Faraway Access Service (RRAS) | CVE-2024-30022 |
Windows Routing and Faraway Access Service (RRAS) | CVE-2024-30023 |
Windows Routing and Faraway Access Service (RRAS) | CVE-2024-30024 |
Windows Common Log File System Driver | CVE-2024-30025 |
Windows NTFS | CVE-2024-30027 |
Windows Win32K – ICOMP | CVE-2024-30028 |
Windows Routing and Faraway Access Service (RRAS) | CVE-2024-30029 |
Windows Win32K – GRFX | CVE-2024-30030 |
Windows CNG Key Isolation Service | CVE-2024-30031 |
Windows DWM Core Library | CVE-2024-30032 |
Microsoft Windows Search Ingredient | CVE-2024-30033 |
Windows Cloud Recordsdata Mini Filter Driver | CVE-2024-30034 |
Windows DWM Core Library | CVE-2024-30035 |
Windows Deployment Providers and products | CVE-2024-30036 |
Windows Common Log File System Driver | CVE-2024-30037 |
Windows Win32K – ICOMP | CVE-2024-30038 |
Windows Faraway Access Connection Manager | CVE-2024-30039 |
Windows MSHTML Platform | CVE-2024-30040 |
Microsoft Bing | CVE-2024-30041 |
Microsoft Office Excel | CVE-2024-30042 |
Microsoft Office SharePoint | CVE-2024-30043 |
Microsoft Office SharePoint | CVE-2024-30044 |
.NET and Visible Studio | CVE-2024-30045 |
Visible Studio | CVE-2024-30046 |
Microsoft Dynamics 365 Buyer Insights | CVE-2024-30047 |
Microsoft Dynamics 365 Buyer Insights | CVE-2024-30048 |
Windows Win32K – ICOMP | CVE-2024-30049 |
Windows Model of the Web (MOTW) | CVE-2024-30050 |
Windows DWM Core Library | CVE-2024-30051 |
Azure Migrate | CVE-2024-30053 |
Vitality BI | CVE-2024-30054 |
Microsoft Edge (Chromium-based mostly mostly) | CVE-2024-30055 |
Microsoft Intune | CVE-2024-30059 |
Along with Microsoft, Adobe released security updates addressing the following vulnerabilities:
Users of the affected Microsoft products mentioned within the security advisory are told to toughen to the most modern tool releases to pause the vulnerabilities from being exploited.
Earlier than installing system updates, itâs extremely truly helpful it’s seemingly you’ll also have in thoughts the importance of rising a backup to your system or wanted documents and data. This precautionary measure is repeatedly truly helpful to pause data loss.
Source credit : cybersecuritynews.com