Security

Patches

Admins can give thanks this November for dollops of Microsoft patches

Don't be a turkey – get these fixed


Patch Tuesday Patch Tuesday has swung around again, and Microsoft has released fixes for 89 CVE-listed security flaws in its products – including two under active attack – and reissued three more.

According to the IT giant, the first exploited flaw – CVE-2024-49039 – would allow privilege escalation thanks to an error in Windows Task Scheduler. Redmond warns that the CVSS 8.8-rated issue can be – and apparently has been – exploited using a low-privilege AppContainer. The upshot is that someone or something rogue on a vulnerable computer can use the bug to meddle with the box in a way they shouldn't be able to.

"An attacker must first gain access to the system, subsequently running a specifically crafted application to exploit the vulnerability," explained Henry Smith, senior security engineer at Automox.

"This could lead to unauthorized execution of privileged RPC functions, potentially allowing the creation of new users or modification of system settings at a higher privilege level than the attacker initially possessed."

The second exploited vulnerability – CVE-2024-43451 – is an issue with Microsoft's NTLM code. The spoofing flaw can be used to obtain a victim's NTLMv2 hash, potentially allowing impersonation of that account. "Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an action other than opening or executing could trigger this vulnerability," the tech giant noted. This is presumably the reason it got a moderate CVSS 6.5 score.

Users of Azure CycleCloud should jump on CVE-2024-43602 – a CVSS 9.9 issue that would allow remote code execution. A rogue user could send a request to modify the configuration of a CycleCloud cluster and exploit the issue to gain root privileges. Microsoft classifies this as less likely to be exploited, but it's a potentially bad bug nevertheless.

Also of serious concern is CVE-2024-43498 – a CVSS 9.8 flaw in .NET and Visual Studio that could be exploited by someone sending malicious requests to a vulnerable .NET webapp or "by loading a specially crafted file into a vulnerable desktop app," Microsoft explained.

Another CVSS 9.8 issue – CVE-2024-43639 – is difficult to exploit though potentially devastating flaw: A malicious application could be built and used by an unauthenticated attacker to exploit "a cryptographic protocol vulnerability in Windows Kerberos," thereby achieving remote code execution. Ooof.

Best (and the worst) of the rest

The US government's CISA has added the Windows Task Scheduler and NTLMv2 issues to its Known Exploited Vulnerabilities Catalog. Also added were flaws in Atlassian Jira server and datacenter products that were addressed back in 2021, a decade-old flaw in Cisco's WebVPN login page, and a GeoJSON URL validation issue from 2021 that has attackers' eyes.

Also on Tuesday, CISA published its list of the top 15 most exploited vulnerabilities from the past year, featuring major technology vendors. Citrix vulnerabilities claimed the first and second spots, while Cisco followed closely with third and fourth. Microsoft appeared twice on the list, and you can read the whole thing here – along with an analysis of trends in the industry from the Five Eyes nations.

In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority targets

The agency reported that "in 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority targets. In 2023, the majority of the most frequently exploited vulnerabilities were initially exploited as a zero-day, which is an increase from 2022, when less than half of the top exploited vulnerabilities were exploited as a zero-day."

CISA observed that "malicious cyber actors continue to have the most success exploiting vulnerabilities within two years after public disclosure of the vulnerability," but gave some reassurance because "the utility of these vulnerabilities declines over time as more systems are patched or replaced. Malicious cyber actors find less utility from zero-day exploits when international cyber security efforts reduce the lifespan of zero-day vulnerabilities."

Speaking of Citrix, it joined the patch party on Tuesday, with fixes for two flaws in NetScaler ADC and NetScaler Gateway and another couple of medium-importance holes in Citrix Session Recording.

After going quiet last month, Intel released 47 patches across a broad spectrum of its processors that are still supported. AMD released a batch of eight security patches.

Adobe has released its usual patch bundle, again with nearly 50 fixes. Adobe Photoshop, Bridge, Audition, After Effects, Substance 3D Painter, Illustrator, InDesign, and Commerce all get corrective code.

So it's time to get your patching priorities sorted and hopefully you'd be done before the turkey is. ®

Send us news
21 Comments

Windows Patch Tuesday hits snag with Citrix software, workarounds published

Microsoft starts 2025 as it hopefully doesn't mean to go on

Microsoft fixes under-attack privilege-escalation holes in Hyper-V

Plus: Excel hell, angst for Adobe fans, and life's too Snort for Cisco

Microsoft eggheads say AI can never be made secure – after testing Redmond's own products

If you want a picture of the future, imagine your infosec team stamping on software forever

Microsoft invites Chinese software vendors to sell on its marketplace and through its partners

Good luck getting buyers and resellers excited about that

New Outlook marches onto Windows 10 for what little time it has left

Users of doomed operating system to receive unloved app via an update

Microsoft's spat with ValueLicensing limps toward 2026 showdown

Legal tussle over resale of on-prem perpetual licenses kicked off four years ago

How Windows got to version 3 – an illustrated history

With added manga and snark. What's not to like?

Where does Microsoft's NPU obsession leave Nvidia's AI PC ambitions?

While Microsoft pushes AI PC experiences, Nvidia is busy wooing developers

Microsoft sues 'foreign-based' cyber-crooks, seizes sites used to abuse AI

Scumbags stole API keys, then started a hacking-as-a-service biz, it is claimed

Microsoft tests 45% M365 price hikes in Asia-Pacific to see how much you enjoy AI

Won’t say if other nations will be hit, but will ‘listen, learn, and improve’ as buyers react – so far with anger

In AI agent push, Microsoft re-orgs to create 'CoreAI – Platform and Tools' team

Nad lad says 30 years of change happening in 3 years ... we're certainly feeling the compression of time

Microsoft trims jobs as new year begins

Redmond claims tiny cuts are performance based