HomeCII/OTMicrosoft December Patch Tuesday 2024 Addresses 70 CVEs

Microsoft December Patch Tuesday 2024 Addresses 70 CVEs

Published on

spot_img

Microsoft’s December Patch Tuesday update, the final one of 2024, has made significant strides in addressing a multitude of vulnerabilities, with a total of 71 newly identified flaws across various products being patched. This update comes as a response to critical security issues that have been actively exploited in the wild, with one notable vulnerability being CVE-2024-49138, a zero-day flaw in the Windows Common Log File System (CLFS) driver.

Throughout 2024, Microsoft has been proactive in addressing security vulnerabilities, with a total of 1,009 Common Vulnerabilities and Exposures (CVEs) being patched, marking a milestone in the company’s commitment to cybersecurity. While 2024 has not surpassed the record set in 2020 with 1,245 CVEs patched, it is only the second year in Patch Tuesday history where Microsoft has exceeded the 1,000 mark.

The December Patch Tuesday update for 2024 addresses a wide range of vulnerabilities, with nearly 40% of them classified as remote code execution (RCE) flaws, 29% as elevation of privilege vulnerabilities, and 10% as denial of service issues. The majority of these vulnerabilities were rated as “important,” with a smaller portion being categorized as “critical.”

One of the most critical vulnerabilities patched in this update is CVE-2024-49138, an elevation of privilege flaw in the Windows CLFS driver that has been actively exploited as a zero-day. This vulnerability poses a serious threat as it could potentially grant attackers SYSTEM-level privileges. The exploitation of this flaw highlights the importance of timely patching and staying ahead of cyber threats.

Another significant vulnerability addressed in the December update is CVE-2024-49070, a remote code execution flaw in Microsoft SharePoint. This vulnerability, rated as “important,” requires a high level of complexity for successful exploitation, emphasizing the need for vigilance and proactive security measures.

In addition to these critical vulnerabilities, Microsoft also patched issues in Microsoft Message Queuing (MSMQ) with CVE-2024-49118 and CVE-2024-49122, both of which are remote code execution flaws rated as “critical.” These vulnerabilities, along with others addressed in Windows Remote Desktop Services, underscore the ongoing efforts to secure systems and protect against malicious threats.

Looking at the bigger picture, 2024 has seen a significant number of zero-day vulnerabilities being actively exploited, particularly in the realm of ransomware attacks. The growing risks associated with RCE vulnerabilities have made them a prime target for threat actors, with ransomware operators leveraging elevation of privilege flaws to carry out their malicious activities.

Overall, the December 2024 Patch Tuesday update from Microsoft signifies a crucial step in addressing security vulnerabilities that could have serious implications for users and organizations. From zero-day exploits to critical vulnerabilities in key Microsoft products, the patching efforts highlight the ongoing commitment of cybersecurity professionals to safeguarding systems and data in an increasingly complex threat landscape.

In conclusion, staying vigilant, keeping systems updated, and implementing robust security measures remain essential in combating evolving cyber threats and ensuring a secure digital environment for all users and organizations.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...