Microsoft Patches One Actively Exploited Vulnerability, Among Others

Microsoft Patches One Actively Exploited Vulnerability, Among Others

Microsoft Patches One Actively Exploited Vulnerability, Among Others

Home » News » Microsoft Patches One Actively Exploited Vulnerability, Among Others
Table of Contents

December introduced a comparatively gentle Patch Tuesday, with one vulnerability having been actively exploited. Of all 70 vulnerabilities mounted, 16 have been categorized as important.

“This yr, cybersecurity professionals should be on Santa’s good record, or, on the very least, Microsoft’s,” Tyler Reguly, affiliate director of safety R&D at cybersecurity software program and companies firm Fortra, instructed roosho in an e-mail.

Microsoft patches leaky CLFS

CVE-2024-49138 is an elevation of privilege vulnerability within the Home windows Frequent Log File System (CLFS) driver. The motive force is a key ingredient of Home windows used to jot down transaction logs. Misuse of the driving force, particularly by means of improper bounds checking, may let an attacker acquire SYSTEM privileges. From there, they might steal knowledge or set up backdoors.

“Provided that CLFS is a typical element throughout a number of variations of Home windows, together with server and consumer installations, the vulnerability has intensive attain, particularly in enterprise environments,” Mike Walters, president and co-founder of Action1, mentioned in an e-mail to roosho.

Addressing this vulnerability ought to be a excessive precedence because it has already been exploited.

Microsoft has launched patches for eight different CLFS vulnerabilities this yr, in accordance with Reguly.

“That’s, nonetheless, an enchancment for Microsoft, who patched 12 CLFS vulnerabilities in 2022 and 10 CLFS vulnerabilities in 2023,” Reguly wrote.

SEE: The U.S. sanctioned Chinese language safety agency Sichuan Silence for exploiting a vulnerability in Sophos firewalls utilized in authorities infrastructure.

‘Tis the season … for distant code execution

One vulnerability scored larger than 9 on the CVSS severity system: CVE-2024-49112, which scored CVSS 9.8. A distant code execution vulnerability may permit an attacker to execute code contained in the Home windows Light-weight Listing Entry Protocol (LDAP) service.

“Home windows Server programs appearing as area controllers (DCs) are particularly in danger, given their essential position in managing listing companies,” mentioned Walters.

This makes December each a superb time to put in the patch for this vulnerability and to recollect an necessary issue of safety hygiene: Area controllers shouldn’t have web entry. Reguly identified that corporations following the Division of Protection’s DISA STIG for Lively Listing Domains ought to have already got blocked area controllers from web connections.

Motion 1 famous that 9 of the December vulnerabilities stem associated to the potential distant code execution.

“Organizations ought to keep away from exposing RDP companies to the worldwide web and implement strong safety controls to mitigate dangers,” wrote Walters. “These flaws additional show the hazards of leaving RDP open and unprotected.”

“If nothing else, we will say that Microsoft is constant,” Reguly added. “Whereas it might be good to see the variety of vulnerabilities every year reducing, not less than consistency lets us know what to anticipate. Since Microsoft has signed CISA’s Safe by Design pledge, we might even see these numbers drop sooner or later.”

Time to examine in on Apple, Google Chrome, and different Patch Tuesday safety updates

Many different corporations time their month-to-month releases for the second Tuesday of the month. Adobe offered a listing of safety updates. Different main patches, as collected by Motion 1, embrace:

  • Patches for vulnerabilities in Google Chrome and Mozilla Firefox.
  • A safety replace for over 100 Cisco gadgets that use the NX-OS knowledge center-focused working system.
  • Fixes for a number of native privilege escalation vulnerabilities in Linux.
  • Patches for 2 actively exploited zero-day vulnerabilities in Macs with Intel chips.

A whole record of Home windows safety updates may be discovered at Microsoft Assist.

author avatar
roosho Senior Engineer (Technical Services)
I am Rakib Raihan RooSho, Jack of all IT Trades. You got it right. Good for nothing. I try a lot of things and fail more than that. That's how I learn. Whenever I succeed, I note that in my cookbook. Eventually, that became my blog. 
share this article.

Enjoying my articles?

Sign up to get new content delivered straight to your inbox.

Please enable JavaScript in your browser to complete this form.
Name