5 Zero-Days & 118 Vulnerabilities Fixed: Microsoft Safety Updates

In its latest Patch Tuesday release, Microsoft addressed 118 vulnerabilities, including five zero-day faults, two of which attackers are actively manipulating. The updates cover different Microsoft products, including Windows, Office, Azure, .NET, and Visual Studio.

Zero-Day Vulnerabilities

Among the five zero-day vulnerabilities fixed, two were actively manipulated in the wild:

  • CVE-2024-43573: A spoofing vulnerability involving the Windows MSHTML medium. This fault permits assaulters to exploit web content, potentially leading to unauthorized actions by users. It has been connected to earlier exploits concerning the MSHTML engine.
  • CVE-2024-43572: A remote code execution (RCE) vulnerability in the Microsoft Management Console (MMC). This exploit can be initiated by hostile MSC files, permitting assaulters to manage arbitrary code on targeted systems. Microsoft has mitigated this by preventing untrusted MSC files from being extended.

The other zero-day  exposures contain:

  • CVE-2024-6197: An RCE vulnerability in Curl, which could be exploited when linking to negative servers.
  • CVE-2024-20659: A safety segment bypass in Windows Hyper-V that could compromise virtual devices within UEFI host appliances.
  • CVE-2024-43583: An elevation of privilege vulnerability in Winlogon, potentially endowing assaulters' SYSTEM claims.

Other Unique Vulnerabilities

The update also managed several other important vulnerabilities:

  • CVE-2024-38179: A height of right vulnerability in Azure Stack Hyperconverged Infrastructure (HCI). It poses a danger of unauthorized entrance and control over impacted systems.
  • CVE-2024-38149: A denial of service (DoS) vulnerability in BranchCache, could disrupt network services by using this defect.

Vulnerability Breakdown

The October update contained fixes for:

  • 28 Elevation of Benefit vulnerabilities
  • 43 Remote Code Execution vulnerabilities
  • 26 Disclaimer of Service vulnerabilities
  • 7 Security Feature Bypass vulnerabilities
  • 6 Information Exposure vulnerabilities
  • 7 Spoofing vulnerabilities.

Microsoft highlights the crucial significance of promptly using these updates. With two zero-days actively manipulated, users and associations are encouraged to prioritize patching to mitigate possible perils. The business resumes to operate on improving its safety standards to safeguard against evolving dangers.

For IT managers and cybersecurity experts, these updates emphasize the demand for constant monitoring and quick movement when using patches. Regular updates and commitment to the best methods in cybersecurity are important to protect systems against exploitation.

Users are encouraged to use these updates promptly to guard against possible invasions. The table delivers a clear list of the vulnerabilities addressed in this Patch Tuesday release.