HomeCyber BalkansMicrosoft fixes six vulnerabilities being actively exploited

Microsoft fixes six vulnerabilities being actively exploited

Published on

spot_img

Microsoft has recently disclosed that six actively exploited vulnerabilities have been identified, with some of them potentially being linked to talks given by security researchers at the Black Hat and DEF CON conferences. Although these vulnerabilities may have been reported to Microsoft in advance, they were not deemed severe enough to require immediate out-of-band fixes. This decision is consistent with Microsoft’s policy of reserving out-of-band fixes for zero-day vulnerabilities that are widely exploited.

One of the vulnerabilities, known as CVE-2024-38178, has been classified as a memory corruption vulnerability in the scripting engine, which could lead to remote code execution. Despite the potential severity of such a vulnerability, it has been rated as important (7.5 out of 10) instead of critical. This is due to the fact that the vulnerability can only be exploited when a user visits a specifically crafted link while using Microsoft Edge in Internet Explorer Mode.

It is important for organizations to understand the nature of these vulnerabilities, especially when they are actively exploited. Microsoft does not provide detailed information about the attacks using zero-day flaws in its advisories, which means that enterprises may not be fully aware of the sophistication or prevalence of these attacks unless the reporting organizations or researchers release their own reports.

As such, enterprises should prioritize patching these actively exploited vulnerabilities regardless of their severity rating or other mitigating factors. By staying informed and taking proactive steps to address these vulnerabilities, organizations can enhance their security posture and reduce the risk of potential exploitation.

Source link

Latest articles

What CISOs Must Get Right as Identity Enters the Agentic Era

Building a Strong Identity Foundation: Essential Steps for Modernization In today's rapidly evolving digital landscape,...

DORA and the Practical Assessment of Operational Resilience

DORA and the Practical Test of Operational Resilience By Alan Stewart-Brown, VP EMEA, Opengear Disruption in...

AI Agent Deletes Startup Data in Just 9 Seconds via API Call

Claude-Powered Tool Deletes Production Data, Then Explains Its Failures In an alarming incident that has...

Cyber Briefing – April 28, 2026: CyberMaterial

Cybersecurity Trends: A Comprehensive Overview In an era defined by rapid technological advancement, the cybersecurity...

More like this

What CISOs Must Get Right as Identity Enters the Agentic Era

Building a Strong Identity Foundation: Essential Steps for Modernization In today's rapidly evolving digital landscape,...

DORA and the Practical Assessment of Operational Resilience

DORA and the Practical Test of Operational Resilience By Alan Stewart-Brown, VP EMEA, Opengear Disruption in...

AI Agent Deletes Startup Data in Just 9 Seconds via API Call

Claude-Powered Tool Deletes Production Data, Then Explains Its Failures In an alarming incident that has...