Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft releases patches for 79 vulnerabilities, including 3 actively exploited Windows vulnerabilities
Global Security

Microsoft releases patches for 79 vulnerabilities, including 3 actively exploited Windows vulnerabilities

AdminBy AdminSeptember 11, 2024No Comments4 Mins Read
Microsoft
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 11, 2024Ravi LakshmananWindows Security/Vulnerabilities

Microsoft

Microsoft on Tuesday opened that three new security vulnerabilities affecting the Windows platform were actively exploited as part of the September 2024 Patch Tuesday update.

The monthly security release addresses a total of 79 vulnerabilities, of which seven are rated critical, 71 are important, and one is rated moderate. It is aside from 26 disadvantages which the tech giant decided on its Chromium-based Edge browser after releasing a patch on Tuesday last month.

The three vulnerabilities that have been exploited in a malicious context are listed below, along with the bug that Microsoft considers an exploit –

  • CVE-2024-38014 (CVSS Score: 7.8) – An elevation of privilege vulnerability in Windows Installer
  • CVE-2024-38217 (CVSS Score: 5.4) – Windows Mark-of-the-Web (MotW) security feature bypass vulnerability
  • CVE-2024-38226 (CVSS Score: 7.3) – Microsoft Publisher Security Bypass Vulnerability
  • CVE-2024-43491 (CVSS Score: 9.8) – Microsoft Windows Update remote code execution vulnerability

“The use of both CVE-2024-38226 and CVE-2024-38217 could lead to the bypassing of critical security features that block Microsoft Office macros from running,” Satnam Narang, senior research engineer at Tenable, said in a statement.

Cyber ​​security

“In both cases, the target must be convinced to open a specially crafted file from a server controlled by the attacker. Their difference is that an attacker must be authenticated to the system and have local access to it in order to exploit CVE-2024. -38226″.

As Elastic Security Labs revealed last month, CVE-2024-38217 – also called LNK Tupat – they say that they were abused in the wild back in February 2018.

CVE-2024-43491, on the other hand, is notable for being similar to a downgrade attack by cybersecurity firm SafeBreach. in detail beginning of last month.

“Microsoft is aware of a vulnerability in the maintenance stack that rolled back fixes for some vulnerabilities affecting additional components in Windows 10, version 1507 (originally released in July 2015),” Redmond noted.

“This means that an attacker could exploit these previously fixed vulnerabilities on Windows 10 version 1507 systems (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) that have installed the Windows security update that was released on March 12, 2024 — KB5035858 (OS) . Build 10240.20526) or other updates released before August 2024.”

The Windows manufacturer went on to say that this can be resolved by installing the September 2024 Service Stack Update (SSU KB5043936) and the Windows September 2024 Security Update (KB5043083), in that order.

It’s also worth noting that Microsoft’s “Exploit Discovered” rating for CVE-2024-43491 stems from a patch rollback that addressed vulnerabilities affecting some add-ons for Windows 10 (version 1507) that were previously in use.

“No exploitation of CVE-2024-43491 itself has been detected,” the company said. “Furthermore, the Windows product team at Microsoft identified this issue, and we have seen no evidence that it has become public knowledge.”

Cyber ​​security

Third-party software patches

In addition to Microsoft, security updates have also been released by other vendors over the past few weeks to address some vulnerabilities, including –

  • Adobe
  • hand
  • Bosch
  • Broadcom (including VMware)
  • Cisco
  • Citrix
  • CODESIS
  • D-Link
  • Dell
  • Drupal
  • F5
  • Fortinet
  • Fortra
  • GitLab
  • Google Android and pixel
  • Google Chrome
  • Google Cloud
  • Google Wear OS
  • Hitachi Energy
  • HP
  • HP Enterprise (including Aruba Networks)
  • IBM
  • Intel
  • Ivanta
  • Lenovo
  • Linux distributions Amazon Linux, Debian, Oracle Linux, Red hat, Rocky Linux, SUSEand Ubuntu
  • MediaTek
  • Mitsubishi Electric
  • MongoDB
  • Mozilla Firefox, Firefox ESR, Focus and Thunderbird
  • NVIDIA
  • ownCloud
  • Palo Alto Networks
  • Software progress
  • QNAP
  • Qualcomm
  • Rockwell Automation
  • Samsung
  • SAP
  • Schneider Electric Company
  • Siemens
  • SolarWinds
  • SonicWall
  • Spring Framework
  • Sinology
  • Veeam
  • Zimbra
  • Zoho ManageEngine ServiceDesk Plus, SupportCenter Plusand ServiceDesk Plus MSP
  • scalingand
  • Zyxel

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025

AI AI agents work on secret accounts – learn how to fasten them in this webinar

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.