Microsoft Urges Immediate Patching of Critical Zero-Day Vulnerabilities in December Update
December 10, 2024
Among the patched vulnerabilities, 17 were rated as Critical, 54 as Important, and one as Moderate, highlighting the urgency of these updates.
The update resolved various issues, including 27 elevation of privilege vulnerabilities, 30 remote code execution flaws, and several others related to information disclosure and denial of service.
CrowdStrike's Advanced Research Team discovered CVE-2024-49138 and reported its active exploitation by malicious actors, underscoring the need for immediate patching.
Experts recommend quickly addressing the LDAP vulnerability, suggesting mitigations such as disconnecting Domain Controllers from the Internet, though this may not be feasible for most enterprises.
In 2024, Microsoft has patched a total of 1,088 vulnerabilities, maintaining a consistent trend with previous years, indicating ongoing security challenges.
In contrast to Microsoft's updates, Adobe released 167 fixes on the same day, including significant updates for Adobe Experience Manager, which had 91 flaws, one of which was critical.
Experts warn that privilege escalation vulnerabilities are often exploited in conjunction with code execution flaws, particularly in ransomware and targeted phishing attacks.
On December 10, 2024, Microsoft released its Patch Tuesday update, addressing 71 vulnerabilities, including a critical zero-day vulnerability in the Windows Common Log File System (CLFS) Driver, tracked as CVE-2024-49138.
A particularly severe vulnerability, CVE-2024-49112, allows remote code execution in the Windows Lightweight Directory Access Protocol (LDAP) with a CVSS score of 9.8, posing a significant risk to Domain Controllers.
Microsoft emphasizes the importance of promptly patching systems and regularly scanning for vulnerabilities to mitigate potential risks.
Users are advised to run Windows Update to install these critical patches, especially if their systems are not set for automatic updates, and to back up important data beforehand.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has classified the CLFS vulnerability as a significant risk, including it in its Known Exploited Vulnerabilities catalog and urging immediate remediation.
Summary based on 11 sources
Get a daily email with more Tech stories
Sources

TechRadar pro • Dec 12, 2024
Microsoft patches worrying zero-day along with 71 other flaws
Krebs on Security • Dec 10, 2024
Patch Tuesday, December 2024 Edition
The Hacker News • Dec 11, 2024
Microsoft Fixes 72 Flaws, Including Patch for Actively Exploited CLFS Vulnerability
The Register • Dec 10, 2024
Microsoft holds last Patch Tuesday of the year with 72 gifts for admins