HomeCII/OTBug left certain Windows PCs vulnerable due to lack of patching -...

Bug left certain Windows PCs vulnerable due to lack of patching – Krebs on Security

Published on

spot_img

Microsoft Corp. released updates today to address a total of 79 security vulnerabilities in its Windows operating systems and related software. Among these vulnerabilities are several flaws that have been actively exploited in attacks. The company also fixed a critical bug that left some Windows 10 PCs at risk of being unpatched against known vulnerabilities for several months earlier this year.

One of the most notable security weaknesses disclosed by Microsoft today is known as CVE-2024-43491. This vulnerability led to the rolling back of fixes for certain vulnerabilities affecting optional components on specific Windows 10 systems manufactured in 2015. Users of Windows 10 systems that installed the monthly security update released in March 2024, or subsequent updates until August 2024, were affected by this issue.

According to Satnam Narang, a senior staff research engineer at Tenable, the label “exploitation detected” attached to CVE-2024-43491 does not necessarily indicate that cybercriminals are actively exploiting the vulnerability but rather that the fixes were rolled back, reintroducing previously exploited vulnerabilities. To address this issue, users are advised to apply both the September 2024 Servicing Stack Update and the September 2024 Windows Security Updates.

Kev Breen, senior director of threat research at Immersive Labs, explained that the root cause of CVE-2024-43491 was the mishandling of build version numbers in the update service code on specific versions of Windows 10. As a result, some Windows 10 systems with optional components enabled were left vulnerable due to a code defect triggered by crossed build version numbers.

Two zero-day vulnerabilities were also addressed in the updates. CVE-2024-38226, affecting Microsoft Publisher, and CVE-2024-38217, a Mark of the Web bypass affecting Office, both require the target to open a malicious Office file to exploit the flaws. Rapid7 noted that exploit code for CVE-2024-38217 is publicly available, increasing the risk of exploitation.

Additionally, Microsoft mentioned CVE-2024-38014, an “elevation of privilege” bug in the Windows Installer, as being actively exploited. This bug allows attackers to gain elevated privileges on affected systems.

In a previous Microsoft Patch Tuesday release titled “Recall Edition,” Microsoft faced criticism over the Recall feature in its Copilot+ PCs, which captures screenshots of user activity. Despite initially suggesting Recall would be optional, Microsoft later clarified that disabling Recall was a bug in the preview version of Copilot+ and would not be available to Windows customers moving forward.

Adobe also released security updates for various products, including Reader, Acrobat, After Effects, Premiere Pro, Illustrator, ColdFusion, Adobe Audition, and Photoshop, addressing vulnerabilities in these software applications.

For a detailed breakdown of the patches released by Microsoft, users can refer to the SANS Internet Storm Center’s list. Additionally, administrators managing multiple systems should keep an eye on AskWoody.com for information on any problematic Windows patches.

If users encounter any issues while applying the latest patches, they are encouraged to share their experiences in the comments section. This comprehensive update from Microsoft underscores the ongoing importance of regularly patching systems to safeguard against potential security threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...