• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft patches 61 flaws, including two actively exploited zero days

Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days

You are here: Home / General Cyber Security News / Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
May 15, 2024

Microsoft has resolved a total of 61 new security flaws in its program as portion of its Patch Tuesday updates for May perhaps 2024, which include two zero-times which have been actively exploited in the wild.

Of the 61 flaws, a person is rated Critical, 59 are rated Significant, and one is rated Average in severity. This is in addition to 30 vulnerabilities fixed in the Chromium-primarily based Edge browser over the earlier month, together with two just lately disclosed zero-times (CVE-2024-4671 and CVE-2024-4761) that have been tagged as exploited in attacks.

The two security shortcomings that have been weaponized in the wild are under –

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • CVE-2024-30040 (CVSS rating: 8.8) – Windows MSHTML Platform Security Element Bypass Vulnerability
  • CVE-2024-30051 (CVSS score: 7.8) – Windows Desktop Window Manager (DWM) Main Library Elevation of Privilege Vulnerability

“An unauthenticated attacker who effectively exploited this vulnerability could obtain code execution through convincing a consumer to open up a malicious doc at which issue the attacker could execute arbitrary code in the context of the person,” the tech giant said in an advisory for CVE-2024-30040.

Having said that, effective exploitation needs an attacker to convince the consumer to load a specially crafted file onto a susceptible program, dispersed possibly by means of email or an immediate message, and trick them into manipulating it. Curiously, the target isn’t going to have to click on or open the destructive file to activate the an infection.

On the other hand, CVE-2024-30051 could permit a menace actor to acquire Method privileges. 3 groups of researchers from Kaspersky, DBAPPSecurity WeBin Lab, Google Threat Evaluation Group, and Mandiant have been credited with getting and reporting the flaw, indicating most likely widespread exploitation.

Cybersecurity

“We have viewed it employed with each other with QakBot and other malware, and consider that several risk actors have access to it,” Kaspersky researchers Boris Larin and Mert Degirmenci explained.

The two vulnerabilities have been included by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Regarded Exploited Vulnerabilities (KEV) catalog, demanding federal organizations to apply the most current fixes by June 4, 2024.

Also solved by Microsoft are various distant code execution bugs, such as 9 impacting Windows Cellular Broadband Driver and seven influencing Windows Routing and Distant Entry Service (RRAS).

Other notable flaws encompass privilege escalation flaws in the Common Log File Technique (CLFS) driver – CVE-2024-29996, CVE-2024-30025 (CVSS scores: 7.8), and CVE-2024-30037 (CVSS score: 7.5) – Get32k (CVE-2024-30028 and CVE-2024-30030, CVSS scores: 7.8), Windows Lookup Assistance (CVE-2024-30033, CVSS score: 7.), and Windows Kernel (CVE-2024-30018, CVSS score: 7.8).

In March 2024, Kaspersky exposed that danger actors are trying to actively exploit now-patched privilege escalation flaws in different Windows factors owing to the simple fact that “it is really a pretty straightforward way to get a rapid NT AUTHORITYSYSTEM.”

Akamai has further more outlined a new privilege escalation technique influencing Energetic Directory (Advertisement) environments that normally takes edge of the DHCP administrators team.

“In scenarios where by the DHCP server part is installed on a Domain Controller (DC), this could help them to gain domain admin privileges,” the firm noted. “In addition to providing a privilege escalation primitive, the identical system could also be applied to produce a stealthy domain persistence mechanism.

Cybersecurity

Rounding off the checklist is a security attribute bypass vulnerability (CVE-2024-30050, CVSS rating: 5.4) impacting Windows Mark-of-the-Web (MotW) that could be exploited by indicates of a destructive file to evade defenses.

Program Patches from Other Suppliers

In addition to Microsoft, security updates have also been introduced by other vendors over the previous number of weeks to rectify various vulnerabilities, which include —

  • Adobe
  • Android
  • Apple
  • Arm
  • ASUS
  • Atos
  • Broadcom (which include VMware)
  • Cacti
  • Cisco
  • Citrix
  • CODESYS
  • Dell
  • Drupal
  • F5
  • Fortinet
  • GitLab
  • Google Chrome
  • Google Cloud
  • Google Dress in OS
  • Hikvision
  • Hitachi Vitality
  • HP
  • HP Company
  • HP Company Aruba Networks
  • IBM
  • Intel
  • Jenkins
  • Juniper Networks
  • Lenovo
  • Linux distributions Debian, Oracle Linux, Red Hat, SUSE, and Ubuntu
  • MediaTek
  • Mitsubishi Electric powered
  • MongoDB
  • Mozilla Thunderbird
  • NVIDIA
  • ownCloud
  • Palo Alto Networks
  • Progress Software package
  • QNAP
  • Qualcomm
  • Rockwell Automation
  • Samsung
  • SAP
  • Schneider Electric
  • Siemens
  • SolarWinds
  • SonicWall
  • Tinyproxy
  • Veeam
  • Veritas
  • Zimbra
  • Zoom, and
  • Zyxel

Discovered this article exciting? Stick to us on Twitter  and LinkedIn to browse a lot more exclusive content we post.


Some parts of this posting are sourced from:
thehackernews.com

Previous Post: «vmware patches severe security flaws in workstation and fusion products VMware Patches Severe Security Flaws in Workstation and Fusion Products
Next Post: Dutch Court Sentences Tornado Cash Co-Founder to 5 Years in Prison for Money Laundering dutch court sentences tornado cash co founder to 5 years in»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.