HomeCII/OTFat Patch Tuesday: February 2024 Edition - Krebs on Security

Fat Patch Tuesday: February 2024 Edition – Krebs on Security

Published on

spot_img

Microsoft Corp. released software updates on Tuesday to fix over 70 security holes in its Windows operating systems and related products. Included in these patches are fixes for two zero-day vulnerabilities that have been actively exploited.

One of the zero-day flaws, identified as CVE-2024-21412, is classified as a “security feature bypass” in the way Windows handles Internet Shortcut Files. This bug has been targeted in active exploits, and attackers would need to trick a user into opening a malicious shortcut file. The ongoing exploitation of CVE-2024-21412 has been linked to an advanced persistent threat group known as “Water Hydra,” which exploits the vulnerability to unload a remote access trojan (RAT) onto infected Windows systems.

The second zero-day flaw, known as CVE-2024-21351, is another security feature bypass in the Windows SmartScreen component, which screens out potentially malicious files downloaded from the Web. This vulnerability alone is not enough for an attacker to compromise a user’s workstation. However, it could be used in conjunction with a spear phishing attack to deliver a malicious file.

According to Satnam Narang, senior staff research engineer at Tenable, the zero-day vulnerability related to Microsoft Exchange Server, known as CVE-2024-21410, can be leveraged to disclose sensitive information like NTLM hashes, which could be utilized in an NTLM relay or “pass the hash” attack. It is important to note that attackers could potentially carry out these types of attacks if the Exchange Server 2019 Cumulative Update 14 (CU14) does not enable Extended Protection for Authentication (EPA) by default.

Another critical remote code execution bug, CVE-2024-21413, was also highlighted by Rapid7’s lead software engineer, Adam Barnett. This vulnerability affects Microsoft Office and could be exploited by just viewing a specially-crafted message in the Outlook Preview pane.

With this latest wave of patches, Microsoft hopes to address the increasing trend of zero-day vulnerabilities being exploited in the wild. However, Microsoft Office 2016 administrators who apply patches outside of Microsoft Update should take note of the various patches that must be installed to achieve remediation of CVE-2024-21413.

It’s essential for Windows end-users to stay current with the latest security updates from Microsoft. It’s generally a good idea to update within a few days of Patch Tuesday to allow time for Microsoft to fix any issues with its patches. Additionally, keeping an eye on websites like Askwoody.com can provide valuable information about potential problems with specific Microsoft updates.

For a more detailed breakdown of the individual flaws addressed by Microsoft in the recent update, you can refer to the SANS Internet Storm Center’s list. These updates are critical to ensuring the security and integrity of Windows operating systems and should be implemented as soon as possible.

Source link

Latest articles

Android 17 Second Beta Enhances Privacy Controls for Contacts, SMS, and Local Networks

Google recently released the second beta version of Android 17, a significant update that...

Study Reveals 87% of Organizations Vulnerable to Attacks from Known Issues

The recently released 2026 State of DevSecOps report has illuminated a pressing issue in...

Europol Targets The Com’s Ransomware and Extortion Networks

Global Law Enforcement Initiative Targets Decentralized Cyber Criminal Collective Law enforcement agencies spanning 28 countries...

Olympique de Marseille Cyberattack – CyberMaterial

Olympique de Marseille Thwarts Cyberattack During Training Break The Olympique de Marseille football club has...

More like this

Android 17 Second Beta Enhances Privacy Controls for Contacts, SMS, and Local Networks

Google recently released the second beta version of Android 17, a significant update that...

Study Reveals 87% of Organizations Vulnerable to Attacks from Known Issues

The recently released 2026 State of DevSecOps report has illuminated a pressing issue in...

Europol Targets The Com’s Ransomware and Extortion Networks

Global Law Enforcement Initiative Targets Decentralized Cyber Criminal Collective Law enforcement agencies spanning 28 countries...