October 8, 2024 at 07:40PM
Patch Tuesday released 117 Microsoft patches, addressing serious vulnerabilities including CVE-2024-43572, a high-risk flaw allowing unauthorized code execution, and CVE-2024-43573, a moderate spoofing issue. Adobe and SAP also issued numerous updates, with notable concerns in BusinessObjects and Apache Log4j related to their respective vulnerabilities.
### Meeting Takeaways
**Patch Tuesday Overview (October)**
– Microsoft released a total of **117 patches**.
– **Critical Vulnerabilities**: Two vulnerabilities under active exploitation, including:
– **CVE-2024-43572**: A **7.8-rated** flaw in Microsoft’s Management Console allowing local code execution through untrusted MSC files.
– **CVE-2024-43573**: A **6.5-rated** spoofing flaw in MSHTML affecting multiple Windows versions.
**Key Vulnerabilities**
1. **CVE-2024-43468**:
– **CVSS Score**: 9.8
– **Type**: Remote code execution in Microsoft Configuration Manager via SQL.
2. **CVE-2024-38124**:
– **CVSS Score**: 9.0
– **Type**: Elevation of privilege in Netlogon, allowing unauthenticated full admin access.
3. Other significant vulnerabilities include:
– **CVE-2024-6197**: 8.8 rating in curl, possible infection through wrong server connection.
– **CVE-2024-43583**: 8.8 rating in Winlogon, allowing unauthenticated full System privileges.
– **CVE-2024-20659**: 7.1 rating for Hyper-V, impacting secure kernel upon reboot.
**Adobe and SAP Patches**
– **Adobe**: Released **52 CVEs**; all lower priority, not under exploitation. Products patched include:
– Commerce, Magento, FrameMaker, InDesign, InCopy, Dimension, Animate, Lightroom, 3D Painter, and Substance 3D Stager.
– **SAP**: Issued **12 patches**, including:
– New fix for **CVE-2024-41730** (9.8-rated BusinessObjects bug).
– New flaw: **CVE-2022-23302** (8.0-rated) concerning JMSSink in Apache Log4j 1.x, affecting SAP Enterprise Project Connection.
**Action Items**
– Ensure rapid attention to critical Microsoft patches, particularly those rated above 7.0.
– Monitor Adobe and SAP updates for compliance and security posture.
– Communicate the risks associated with the vulnerabilities to relevant teams for swift action.