CyberSecurity SEE

Microsoft December Patch Tuesday 2024 Addresses 70 CVEs

Microsoft December Patch Tuesday 2024 Addresses 70 CVEs

Microsoft’s December Patch Tuesday update, the final one of 2024, has made significant strides in addressing a multitude of vulnerabilities, with a total of 71 newly identified flaws across various products being patched. This update comes as a response to critical security issues that have been actively exploited in the wild, with one notable vulnerability being CVE-2024-49138, a zero-day flaw in the Windows Common Log File System (CLFS) driver.

Throughout 2024, Microsoft has been proactive in addressing security vulnerabilities, with a total of 1,009 Common Vulnerabilities and Exposures (CVEs) being patched, marking a milestone in the company’s commitment to cybersecurity. While 2024 has not surpassed the record set in 2020 with 1,245 CVEs patched, it is only the second year in Patch Tuesday history where Microsoft has exceeded the 1,000 mark.

The December Patch Tuesday update for 2024 addresses a wide range of vulnerabilities, with nearly 40% of them classified as remote code execution (RCE) flaws, 29% as elevation of privilege vulnerabilities, and 10% as denial of service issues. The majority of these vulnerabilities were rated as “important,” with a smaller portion being categorized as “critical.”

One of the most critical vulnerabilities patched in this update is CVE-2024-49138, an elevation of privilege flaw in the Windows CLFS driver that has been actively exploited as a zero-day. This vulnerability poses a serious threat as it could potentially grant attackers SYSTEM-level privileges. The exploitation of this flaw highlights the importance of timely patching and staying ahead of cyber threats.

Another significant vulnerability addressed in the December update is CVE-2024-49070, a remote code execution flaw in Microsoft SharePoint. This vulnerability, rated as “important,” requires a high level of complexity for successful exploitation, emphasizing the need for vigilance and proactive security measures.

In addition to these critical vulnerabilities, Microsoft also patched issues in Microsoft Message Queuing (MSMQ) with CVE-2024-49118 and CVE-2024-49122, both of which are remote code execution flaws rated as “critical.” These vulnerabilities, along with others addressed in Windows Remote Desktop Services, underscore the ongoing efforts to secure systems and protect against malicious threats.

Looking at the bigger picture, 2024 has seen a significant number of zero-day vulnerabilities being actively exploited, particularly in the realm of ransomware attacks. The growing risks associated with RCE vulnerabilities have made them a prime target for threat actors, with ransomware operators leveraging elevation of privilege flaws to carry out their malicious activities.

Overall, the December 2024 Patch Tuesday update from Microsoft signifies a crucial step in addressing security vulnerabilities that could have serious implications for users and organizations. From zero-day exploits to critical vulnerabilities in key Microsoft products, the patching efforts highlight the ongoing commitment of cybersecurity professionals to safeguarding systems and data in an increasingly complex threat landscape.

In conclusion, staying vigilant, keeping systems updated, and implementing robust security measures remain essential in combating evolving cyber threats and ensuring a secure digital environment for all users and organizations.

Source link

Exit mobile version