Microsoft Urges Immediate Patching of Critical Zero-Day Vulnerabilities in December Update

December 10, 2024
Microsoft Urges Immediate Patching of Critical Zero-Day Vulnerabilities in December Update
  • Among the patched vulnerabilities, 17 were rated as Critical, 54 as Important, and one as Moderate, highlighting the urgency of these updates.

  • The update resolved various issues, including 27 elevation of privilege vulnerabilities, 30 remote code execution flaws, and several others related to information disclosure and denial of service.

  • CrowdStrike's Advanced Research Team discovered CVE-2024-49138 and reported its active exploitation by malicious actors, underscoring the need for immediate patching.

  • Experts recommend quickly addressing the LDAP vulnerability, suggesting mitigations such as disconnecting Domain Controllers from the Internet, though this may not be feasible for most enterprises.

  • In 2024, Microsoft has patched a total of 1,088 vulnerabilities, maintaining a consistent trend with previous years, indicating ongoing security challenges.

  • In contrast to Microsoft's updates, Adobe released 167 fixes on the same day, including significant updates for Adobe Experience Manager, which had 91 flaws, one of which was critical.

  • Experts warn that privilege escalation vulnerabilities are often exploited in conjunction with code execution flaws, particularly in ransomware and targeted phishing attacks.

  • On December 10, 2024, Microsoft released its Patch Tuesday update, addressing 71 vulnerabilities, including a critical zero-day vulnerability in the Windows Common Log File System (CLFS) Driver, tracked as CVE-2024-49138.

  • A particularly severe vulnerability, CVE-2024-49112, allows remote code execution in the Windows Lightweight Directory Access Protocol (LDAP) with a CVSS score of 9.8, posing a significant risk to Domain Controllers.

  • Microsoft emphasizes the importance of promptly patching systems and regularly scanning for vulnerabilities to mitigate potential risks.

  • Users are advised to run Windows Update to install these critical patches, especially if their systems are not set for automatic updates, and to back up important data beforehand.

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has classified the CLFS vulnerability as a significant risk, including it in its Known Exploited Vulnerabilities catalog and urging immediate remediation.

Summary based on 11 sources


Get a daily email with more Tech stories

Sources


Patch Tuesday, December 2024 Edition

Krebs on Security • Dec 10, 2024

Patch Tuesday, December 2024 Edition



More Stories