Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 89 flaws

Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 89 flaws

November 13, 2024 at 11:36AM

Microsoft’s November 2024 Patch Tuesday addressed 89 vulnerabilities, including four zero-days, with two actively exploited. Key fixes involve critical flaws in remote code execution and privilege escalation. Other notable updates were shared by Adobe, Cisco, and Google. Comprehensive vulnerability details are outlined in the full report.

### Meeting Takeaways – Microsoft November 2024 Patch Tuesday

**Key Updates:**
1. **Patch Overview:**
– **Total Flaws Fixed:** 89 vulnerabilities, including:
– **Critical Vulnerabilities:** 4 (2 remote code execution, 2 elevation of privilege)
– **Zero-days:** 4 (2 actively exploited, 3 publicly disclosed)

2. **Vulnerability Categories:**
– **Total Count of Bugs:**
– Elevation of Privilege: **26**
– Security Feature Bypass: **2**
– Remote Code Execution: **52**
– Information Disclosure: **1**
– Denial of Service: **4**
– Spoofing: **3**
– This count excludes two vulnerabilities fixed in Microsoft Edge on November 7.

3. **Zero-day Vulnerabilities:**
– **CVE-2024-43451:** NTLM Hash Disclosure Spoofing Vulnerability (actively exploited)
– Allows remote exposure of NTLMv2 hashes with minimal user interaction.
– **CVE-2024-49039:** Windows Task Scheduler Elevation of Privilege Vulnerability (actively exploited)
– Allows execution from a low privilege AppContainer, elevating privileges.

– **Publicly Disclosed Vulnerabilities:**
– **CVE-2024-49040:** Microsoft Exchange Server Spoofing Vulnerability.
– **CVE-2024-49019:** Active Directory Certificate Services Elevation of Privilege Vulnerability.

4. **Updates from Other Vendors:**
– Adobe, Cisco, Citrix, Dell, D-Link, Google, Ivanti, SAP, Schneider Electric, and Siemens all released security updates in November 2024.

5. **Full List of Resolved Vulnerabilities:**
– Available for further review, encompassing various Microsoft products including .NET, Visual Studio, SQL Server, and Windows components.

6. **Clarification:**
– Total number of flaws corrected was updated to 89 to reflect accurate counts after excluding the previously mentioned Edge vulnerabilities.

These updates emphasize the importance of timely software patching to mitigate security risks associated with both new and previously identified vulnerabilities.

Full Article