Microsoft Releases Updates for 79 Vulnerabilities, Including 3 Actively Exploited Windows Vulnerabilities

September 11, 2024Ravie LakshmananWindows Security / Vulnerability

Microsoft revealed on Tuesday that three fresh security vulnerabilities affecting the Windows platform have been actively exploited as part of its September 2024 Patch Tuesday upd

Microsoft Issues Patches for 79 Flaws, Including 3 Actively Exploited Windows Flaws

September 11, 2024Ravie LakshmananWindows Security / Vulnerability

Microsoft Issues Patches for 79 Flaws, Including 3 Actively Exploited Windows Flaws

Microsoft revealed on Tuesday that three fresh security vulnerabilities affecting the Windows platform have been actively exploited as part of its September 2024 Patch Tuesday update.

The monthly security patch addresses a total of 79 vulnerabilities, consisting of seven Critical, 71 Important, and one Moderate in severity. Additionally, Microsoft cleared 26 flaws in its Edge browser based on Chromium since the previous Patch Tuesday release.

The three vulnerabilities currently exploited in a malicious manner are as follows, along with a bug treated as exploited by Microsoft –

  • CVE-2024-38014 (CVSS score: 7.8) – Windows Installer Elevation of Privilege Vulnerability
  • CVE-2024-38217 (CVSS score: 5.4) – Windows Mark-of-the-Web (MotW) Security Feature Bypass Vulnerability
  • CVE-2024-38226 (CVSS score: 7.3) – Microsoft Publisher Security Feature Bypass Vulnerability
  • CVE-2024-43491 (CVSS score: 9.8) – Microsoft Windows Update Remote Code Execution Vulnerability

“The exploitation of CVE-2024-38226 and CVE-2024-38217 can result in bypassing critical security mechanisms that prevent Microsoft Office macros from executing,” stated Satnam Narang, senior staff research engineer at Tenable.

Cybersecurity

“In both scenarios, the target must be persuaded to open a specially crafted file from a server controlled by the attacker. The difference between them lies in the fact that an attacker would require authentication and local access to exploit CVE-2024-38226.”

As revealed by Elastic Security Labs in the past month, CVE-2024-38217 – also known as LNK Stomping – has reportedly been exploited since February 2018.

CVE-2024-43491, on the other hand, is noteworthy because of its similarity to the downgrade attack disclosed by cybersecurity firm SafeBreach earlier last month details about.

“Microsoft has detected a vulnerability in the Servicing Stack that has reverted the fixes for certain vulnerabilities impacting Optional Components on Windows 10, version 1507 (original version released in July 2015),” noted Redmond.

“Consequently, an attacker could exploit these previously patched vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have applied the Windows security update from March 12, 2024 — KB5035858 (OS Build 10240.20526) or other subsequent updates until August 2024.”

Microsoft stated that the issue can be resolved by first installing the September 2024 Servicing Stack update (SSU KB5043936) followed by the September 2024 Windows security update (KB5043083).

It should be noted that Microsoft’s “Exploitation Detected” evaluation of CVE-2024-43491 is due to the rollback of fixes addressing vulnerabilities in certain Optional Components for Windows 10 (version 1507) that have been previously exploited.

“No instances of exploitation of CVE-2024-43491 itself have been observed,” the company mentioned. “Additionally, Microsoft’s Windows product team identified this issue, and no evidence suggests that it has been publicly disclosed.”

Cybersecurity

Product Updates from Various Providers

Aside from Microsoft, other vendors have also rolled out security patches over the recent weeks to address several vulnerabilities, including —

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.