7.8 C
New York
Sunday, February 23, 2025

Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 91 flaws

Must read

Nowadays is Microsoft’s November 2024 Patch Tuesday, which incorporates safety updates for 91 flaws, together with 4 zero-days, two of which might be actively exploited.

This Patch Tuesday fastened 4 essential vulnerabilities, which come with two far flung code execution and two elevation of privileges flaws.

The choice of insects in each and every vulnerability class is indexed underneath:

  • 26 Elevation of Privilege vulnerabilities
  • 2 Safety Function Bypass vulnerabilities
  • 52 Far flung Code Execution vulnerabilities
  • 1 Knowledge Disclosure vulnerability
  • 4 Denial of Provider vulnerabilities
  • 3 Spoofing vulnerabilities

This rely does no longer come with two Edge flaws that have been up to now fastened on November seventh.

- Advertisement -

To be informed extra concerning the non-security updates launched lately, you’ll be able to assessment our devoted articles at the new Home windows 11 KB5046617 and KB5046633 cumulative updates and the Home windows 10 KB5046613 replace.

4 zero-days disclosed

This month’s Patch Tuesday fixes 4 zero-days, two of which have been actively exploited in assaults, and 3 have been publicly disclosed.

Microsoft classifies a zero-day flaw as one this is publicly disclosed or actively exploited whilst no authentic repair is to be had.

The 2 actively exploited zero-day vulnerabilities in lately’s updates are:

CVE-2024-43451 – NTLM Hash Disclosure Spoofing Vulnerability

Microsoft has fastened a vulnerability that exposes NTLM hashes to far flung attackers with minimum interplay with a malicious record.

“This vulnerability discloses a consumer’s NTLMv2 hash to the attacker who may just use this to authenticate because the consumer,” defined Microsoft.

- Advertisement -

“Minimum interplay with a malicious record via a consumer similar to settling on (single-click), analyzing (right-click), or appearing an motion rather than opening or executing may just cause this vulnerability,” endured Microsoft.

Microsoft says Israel Yeshurun of ClearSky Cyber Safety found out this vulnerability and that it was once publicly disclosed, however didn’t proportion to any extent further main points.

CVE-2024-49039 – Home windows Process Scheduler Elevation of Privilege Vulnerability

A specifically crafted software may well be finished that elevates privilege to Medium Integrity degree.

“On this case, a a success assault may well be carried out from a low privilege AppContainer. The attacker may just lift their privileges and execute code or get admission to assets at a better integrity degree than that of the AppContainer execution atmosphere,” defined Microsoft.

Microsoft says that exploiting this vulnerability would permit attackers to execute RPC purposes which can be usually limited to privileged accounts.

The flaw was once found out via Vlad Stolyarov and Bahare Sabouri of Google’s Risk Research Staff.

It’s not identified how the flaw was once exploited in assaults.

- Advertisement -

The opposite 3 vulnerabilities that have been publicly disclosed however no longer exploited in assaults are:

CVE-2024-49040 – Microsoft Alternate Server Spoofing Vulnerability

Microsoft has fastened a Microsoft Alternate vulnerability that permits risk actors to spoof the sender’s electronic mail deal with in emails to native recipients.

“Microsoft is conscious about a vulnerability (CVE-2024-49040) that permits attackers to run spoofing assaults towards Microsoft Alternate Server,” explains a similar advisory via Microsoft.

“The vulnerability is led to via the present implementation of the P2 FROM header verification, which occurs in shipping.”

Beginning with this month’s Microsoft Alternate safety updates, Microsoft is now detecting and flagging spoofed emails with an alert prepended to the e-mail frame that states, “Understand: This electronic mail seems to be suspicious. Don’t believe the ideas, hyperlinks, or attachments on this electronic mail with out verifying the supply via a relied on way.”

Microsoft says the flaw was once found out via Slonser at Solidlab, who publicly disclosed the flaw on this article.

CVE-2024-49019 – Energetic Listing Certificates Services and products Elevation of Privilege Vulnerability

See also  Critical Rust flaw enables Windows command injection attacks

Microsoft fastened a flaw that permits attackers to achieve area administrator privileges via abusing integrated default model 1 certificates templates.

“Test when you’ve got printed any certificate created the use of a model 1 certificates template the place the Supply of topic identify is about to “Equipped within the request” and the Join permissions are granted to a broader set of accounts, similar to area customers or area computer systems,” explains Microsoft.

“An instance is the integrated Internet Server template, however it’s not prone via default because of its limited Join permissions.”

The flaw was once found out via Lou Scicchitano, Scot Berner, and Justin Bollinger with TrustedSec, who disclosed the “EKUwu” vulnerability in October.

“The usage of integrated default model 1 certificates templates, an attacker can craft a CSR to incorporate software insurance policies which can be most well-liked over the configured Prolonged Key Utilization attributes specified within the template,” reads TrustedSec’s record.

“The one requirement is enrollment rights, and it may be used to generate consumer authentication, certificates request agent, and codesigning certificate the use of the WebServer template.”

As defined above, CVE-2024-43451 was once additionally publicly disclosed.

Fresh updates from different corporations

Different distributors who launched updates or advisories in November 2024 come with:

  • Adobe launched safety updates for a large number of packages, together with Photoshop, Illustrator, and Trade.
  • Cisco releases safety updates for a couple of merchandise, together with Cisco Telephones, Nexus Dashboard, Identification Services and products Engine, and extra.
  • Citrix releases safety updates for NetScaler ADC and NetScaler Gateway vulnerabilities. Additionally they launched an replace for the Citrix Digital Apps and Desktops reported via Watchtowr.
  • Dell releases safety updates for code execution and safety bypass flaws in SONiC OS.
  • D-Hyperlink releases a safety replace for a essential DSL6740C flaw that permits amendment of account passwords.
  • Google launched Chrome 131, which incorporates 12 safety fixes. No zero-days.
  • Ivanti releases safety updates for twenty-five vulnerabilities in Ivanti Attach Protected (ICS), Ivanti Coverage Protected (IPS), Ivanti Protected Get right of entry to Consumer (ISAC).
  • SAP releases safety updates for a couple of merchandise as a part of November Patch Day.
  • Schneider Electrical releases safety updates for flaws in Modicon M340, Momentum, and MC80 merchandise.
  • Siemens launched a safety replace for a essential 10/10 flaw in TeleControl Server Elementary tracked as CVE-2024-44102.

The November 2024 Patch Tuesday Safety Updates

Under is all the record of resolved vulnerabilities within the November 2024 Patch Tuesday updates.

To get admission to the overall description of each and every vulnerability and the programs it impacts, you’ll be able to view the complete record right here.

Tag CVE ID CVE Identify Severity
.NET and Visible Studio CVE-2024-43499 .NET and Visible Studio Denial of Provider Vulnerability Essential
.NET and Visible Studio CVE-2024-43498 .NET and Visible Studio Far flung Code Execution Vulnerability Vital
Airlift.microsoft.com CVE-2024-49056 Airlift.microsoft.com Elevation of Privilege Vulnerability Vital
Azure CycleCloud CVE-2024-43602 Azure CycleCloud Far flung Code Execution Vulnerability Essential
LightGBM CVE-2024-43598 LightGBM Far flung Code Execution Vulnerability Essential
Microsoft Defender for Endpoint CVE-2024-5535 OpenSSL: CVE-2024-5535 SSL_select_next_proto buffer overread Essential
Microsoft Edge (Chromium-based) CVE-2024-10826 Chromium: CVE-2024-10826 Use after loose in Circle of relatives Reports Unknown
Microsoft Edge (Chromium-based) CVE-2024-10827 Chromium: CVE-2024-10827 Use after loose in Serial Unknown
Microsoft Alternate Server CVE-2024-49040 Microsoft Alternate Server Spoofing Vulnerability Essential
Microsoft Graphics Part CVE-2024-49031 Microsoft Administrative center Graphics Far flung Code Execution Vulnerability Essential
Microsoft Graphics Part CVE-2024-49032 Microsoft Administrative center Graphics Far flung Code Execution Vulnerability Essential
Microsoft Administrative center Excel CVE-2024-49029 Microsoft Excel Far flung Code Execution Vulnerability Essential
Microsoft Administrative center Excel CVE-2024-49026 Microsoft Excel Far flung Code Execution Vulnerability Essential
Microsoft Administrative center Excel CVE-2024-49027 Microsoft Excel Far flung Code Execution Vulnerability Essential
Microsoft Administrative center Excel CVE-2024-49028 Microsoft Excel Far flung Code Execution Vulnerability Essential
Microsoft Administrative center Excel CVE-2024-49030 Microsoft Excel Far flung Code Execution Vulnerability Essential
Microsoft Administrative center SharePoint ADV240001 Microsoft SharePoint Server Protection in Intensity Replace None
Microsoft Administrative center Phrase CVE-2024-49033 Microsoft Phrase Safety Function Bypass Vulnerability Essential
Microsoft PC Supervisor CVE-2024-49051 Microsoft PC Supervisor Elevation of Privilege Vulnerability Essential
Microsoft Digital Arduous Force CVE-2024-38264 Microsoft Digital Arduous Disk (VHDX) Denial of Provider Vulnerability Essential
Microsoft Home windows DNS CVE-2024-43450 Home windows DNS Spoofing Vulnerability Essential
Position: Home windows Energetic Listing Certificates Services and products CVE-2024-49019 Energetic Listing Certificates Services and products Elevation of Privilege Vulnerability Essential
Position: Home windows Hyper-V CVE-2024-43633 Home windows Hyper-V Denial of Provider Vulnerability Essential
Position: Home windows Hyper-V CVE-2024-43624 Home windows Hyper-V Shared Digital Disk Elevation of Privilege Vulnerability Essential
SQL Server CVE-2024-48998 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-48997 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-48993 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49001 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49000 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-48999 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49043 Microsoft.SqlServer.XEvent.Configuration.dll Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-43462 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-48995 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-48994 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-38255 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-48996 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-43459 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49002 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49013 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49014 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49011 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49012 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49015 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49018 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49021 Microsoft SQL Server Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49016 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49017 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49010 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49005 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49007 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49003 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49004 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49006 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49009 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
SQL Server CVE-2024-49008 SQL Server Local Consumer Far flung Code Execution Vulnerability Essential
TorchGeo CVE-2024-49048 TorchGeo Far flung Code Execution Vulnerability Essential
Visible Studio CVE-2024-49044 Visible Studio Elevation of Privilege Vulnerability Essential
Visible Studio Code CVE-2024-49050 Visible Studio Code Python Extension Far flung Code Execution Vulnerability Essential
Visible Studio Code CVE-2024-49049 Visible Studio Code Far flung Extension Elevation of Privilege Vulnerability Reasonable
Home windows CSC Provider CVE-2024-43644 Home windows Consumer-Facet Caching Elevation of Privilege Vulnerability Essential
Home windows Defender Software Keep watch over (WDAC) CVE-2024-43645 Home windows Defender Software Keep watch over (WDAC) Safety Function Bypass Vulnerability Essential
Home windows DWM Core Library CVE-2024-43636 Win32k Elevation of Privilege Vulnerability Essential
Home windows DWM Core Library CVE-2024-43629 Home windows DWM Core Library Elevation of Privilege Vulnerability Essential
Home windows Kerberos CVE-2024-43639 Home windows Kerberos Far flung Code Execution Vulnerability Vital
Home windows Kernel CVE-2024-43630 Home windows Kernel Elevation of Privilege Vulnerability Essential
Home windows NT OS Kernel CVE-2024-43623 Home windows NT OS Kernel Elevation of Privilege Vulnerability Essential
Home windows NTLM CVE-2024-43451 NTLM Hash Disclosure Spoofing Vulnerability Essential
Home windows Bundle Library Supervisor CVE-2024-38203 Home windows Bundle Library Supervisor Knowledge Disclosure Vulnerability Essential
Home windows Registry CVE-2024-43641 Home windows Registry Elevation of Privilege Vulnerability Essential
Home windows Registry CVE-2024-43452 Home windows Registry Elevation of Privilege Vulnerability Essential
Home windows Protected Kernel Mode CVE-2024-43631 Home windows Protected Kernel Mode Elevation of Privilege Vulnerability Essential
Home windows Protected Kernel Mode CVE-2024-43646 Home windows Protected Kernel Mode Elevation of Privilege Vulnerability Essential
Home windows Protected Kernel Mode CVE-2024-43640 Home windows Kernel-Mode Driving force Elevation of Privilege Vulnerability Essential
Home windows SMB CVE-2024-43642 Home windows SMB Denial of Provider Vulnerability Essential
Home windows SMBv3 Consumer/Server CVE-2024-43447 Home windows SMBv3 Server Far flung Code Execution Vulnerability Essential
Home windows Process Scheduler CVE-2024-49039 Home windows Process Scheduler Elevation of Privilege Vulnerability Essential
Home windows Telephony Provider CVE-2024-43628 Home windows Telephony Provider Far flung Code Execution Vulnerability Essential
Home windows Telephony Provider CVE-2024-43621 Home windows Telephony Provider Far flung Code Execution Vulnerability Essential
Home windows Telephony Provider CVE-2024-43620 Home windows Telephony Provider Far flung Code Execution Vulnerability Essential
Home windows Telephony Provider CVE-2024-43627 Home windows Telephony Provider Far flung Code Execution Vulnerability Essential
Home windows Telephony Provider CVE-2024-43635 Home windows Telephony Provider Far flung Code Execution Vulnerability Essential
Home windows Telephony Provider CVE-2024-43622 Home windows Telephony Provider Far flung Code Execution Vulnerability Essential
Home windows Telephony Provider CVE-2024-43626 Home windows Telephony Provider Elevation of Privilege Vulnerability Essential
Home windows Replace Stack CVE-2024-43530 Home windows Replace Stack Elevation of Privilege Vulnerability Essential
Home windows USB Video Driving force CVE-2024-43643 Home windows USB Video Elegance Machine Driving force Elevation of Privilege Vulnerability Essential
Home windows USB Video Driving force CVE-2024-43449 Home windows USB Video Elegance Machine Driving force Elevation of Privilege Vulnerability Essential
Home windows USB Video Driving force CVE-2024-43637 Home windows USB Video Elegance Machine Driving force Elevation of Privilege Vulnerability Essential
Home windows USB Video Driving force CVE-2024-43634 Home windows USB Video Elegance Machine Driving force Elevation of Privilege Vulnerability Essential
Home windows USB Video Driving force CVE-2024-43638 Home windows USB Video Elegance Machine Driving force Elevation of Privilege Vulnerability Essential
Home windows VMSwitch CVE-2024-43625 Microsoft Home windows VMSwitch Elevation of Privilege Vulnerability Vital
Home windows Win32 Kernel Subsystem CVE-2024-49046 Home windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Essential
See also  GMKtec M7 Ryzen 7 Professional Mini PC with OcuLink from $299

Replace 9/11/24: Up to date to give an explanation for that handiest 3 flaws have been actively exploited and why CVE-2024-43491 was once marked as exploited.

Related News

- Advertisement -
- Advertisement -

Latest News

- Advertisement -