Patch Tuesday: Remote Code Execution Flaw in Microsoft Message Queuing

Patch Tuesday: Remote Code Execution Flaw in Microsoft Message Queuing

June 11, 2024 at 05:36PM

Microsoft has issued urgent patches for critical vulnerabilities in its Windows operating system. The most severe flaw, CVE-2024-30080, allows for remote code execution in the Microsoft Message Queuing component. Additionally, there are numerous code execution issues in Microsoft Office, Windows services, and a remote code execution vulnerability in Windows WiFi driver. Adobe also warns of code execution vulnerabilities in its products.

Based on the meeting notes, the key takeaways are:

1. Urgent attention is required for patches for a critical remote code execution vulnerability in the Microsoft Message Queuing (MSMQ) component, tagged as CVE-2024-30080, with a severity score of 9.8/10.

2. The vulnerability can be exploited by an attacker sending specially crafted malicious MSMQ packets to a MSMQ server, potentially resulting in remote code execution on the server side.

3. Windows message queuing service needs to be enabled for a system to be exploitable by this vulnerability, and customers are urged to check for a service running named Message Queuing and TCP port 1801 listening on the machine.

4. This Patch Tuesday covers at least 51 security defects across various Windows OS components and services, including multiple code execution issues in the Microsoft Office productivity suite and remotely exploitable bugs in the Windows Link Layer Topology Discovery Protocol and Windows Event Trace Log File Parsing.

5. Security experts are also calling attention to CVE-2024-30078, a Windows WiFi driver remote code execution vulnerability with a severity score of 8.8/10, requiring an attacker to be within proximity of the target system to send and receive radio transmissions for exploitation.

6. Adobe has warned of code execution attacks on Windows and macOS platforms via security flaws in Adobe Photoshop, Adobe After Effects, and Adobe Illustrator products, with no known exploits in the wild for the issues addressed in the current period.

It is crucial for Windows administrators to take immediate action to ensure patching and review system configurations to mitigate the identified vulnerabilities.

Full Article