Microsoft issues 117 patches – some for flaws already under attack

Microsoft issues 117 patches – some for flaws already under attack

October 8, 2024 at 07:40PM

Patch Tuesday released 117 Microsoft patches, addressing serious vulnerabilities including CVE-2024-43572, a high-risk flaw allowing unauthorized code execution, and CVE-2024-43573, a moderate spoofing issue. Adobe and SAP also issued numerous updates, with notable concerns in BusinessObjects and Apache Log4j related to their respective vulnerabilities.

### Meeting Takeaways

**Patch Tuesday Overview (October)**
– Microsoft released a total of **117 patches**.
– **Critical Vulnerabilities**: Two vulnerabilities under active exploitation, including:
– **CVE-2024-43572**: A **7.8-rated** flaw in Microsoft’s Management Console allowing local code execution through untrusted MSC files.
– **CVE-2024-43573**: A **6.5-rated** spoofing flaw in MSHTML affecting multiple Windows versions.

**Key Vulnerabilities**
1. **CVE-2024-43468**:
– **CVSS Score**: 9.8
– **Type**: Remote code execution in Microsoft Configuration Manager via SQL.

2. **CVE-2024-38124**:
– **CVSS Score**: 9.0
– **Type**: Elevation of privilege in Netlogon, allowing unauthenticated full admin access.

3. Other significant vulnerabilities include:
– **CVE-2024-6197**: 8.8 rating in curl, possible infection through wrong server connection.
– **CVE-2024-43583**: 8.8 rating in Winlogon, allowing unauthenticated full System privileges.
– **CVE-2024-20659**: 7.1 rating for Hyper-V, impacting secure kernel upon reboot.

**Adobe and SAP Patches**
– **Adobe**: Released **52 CVEs**; all lower priority, not under exploitation. Products patched include:
– Commerce, Magento, FrameMaker, InDesign, InCopy, Dimension, Animate, Lightroom, 3D Painter, and Substance 3D Stager.

– **SAP**: Issued **12 patches**, including:
– New fix for **CVE-2024-41730** (9.8-rated BusinessObjects bug).
– New flaw: **CVE-2022-23302** (8.0-rated) concerning JMSSink in Apache Log4j 1.x, affecting SAP Enterprise Project Connection.

**Action Items**
– Ensure rapid attention to critical Microsoft patches, particularly those rated above 7.0.
– Monitor Adobe and SAP updates for compliance and security posture.
– Communicate the risks associated with the vulnerabilities to relevant teams for swift action.

Full Article