Today: Dec 18, 2024

Microsoft's January 2024 Home windows Replace Patches 48 New Vulnerabilities

Microsoft's January 2024 Home windows Replace Patches 48 New Vulnerabilities
January 10, 2024



 Jan 10, 2024 Newsroom Vulnerability / Home windows SafetyMicrosoft's January 2024 Home windows Replace Patches 48 New Vulnerabilities
Microsoft has addressed a complete of 48 insects with its tool as a part of the January 2024 Patch Tuesday replace. Of the 48 insects, two are rated Severe and 46 are rated Important. There’s no proof that any problems are publicly identified or underneath assault on the time of unencumber, making it the second one consecutive Patch Tuesday with out 0 days. Those updates come with 9 safety vulnerabilities which were resolved within the Chromium-Edge browser because the unencumber of the December 2023 Patch Tuesday replace. This features a zero-day repair (CVE-2023-7024, CVSS ranking: 8.8) that Google mentioned used to be used within the wild. Essentially the most critical some of the insects which were up to date this month are – CVE-2024-20674 (CVSS ranking: 9.0) – Home windows Kerberos Safety Characteristic Bypass Vulnerability CVE-2024-20700 (CVSS ranking: 7.5) – Home windows Hyper-V Far flung Code Execution Vulnerability “Authentication data can also be bypassed as a result of this vulnerability lets in for impersonation,” Microsoft mentioned in advisory CVE-2024-20674.
Cybersecurity
“An authenticated attacker may exploit this vulnerability through launching a man-in-the-middle (MitM) or different community compromise way, after which sending a malicious Kerberos message to the affected consumer gadget to masquerade as a Kerberos authentication server.” Then again, the corporate famous that a success use will require an attacker to get right of entry to a limited community. Safety researcher ldwilmore34 is credited with discovering and reporting the flaw. CVE-2024-20700, however, does now not require authentication or consumer interplay for far off code execution, even if successful the race is vital to release an assault. “It's now not transparent the place the attacker will have to be – the LAN the place the hypervisor is living, or the community created and controlled through the hypervisor – or how far off code can also be completed,” mentioned Adam Barnett, tool director. engineer at Rapid7, informed The Hacker Information. Different identified vulnerabilities come with CVE-2024-20653 (CVSS ranking: 7.8), a vulnerability affecting the Commonplace Log Record Machine (CLFS) motive force, and CVE-2024-0056 (CVSS ranking: 8.7), a safety vulnerability affecting Machine. Information.SqlClient and Microsoft.Information.SqlClient. “An attacker who effectively exploited this vulnerability may carry out a man-in-the-middle (MitM) assault and may obtain and browse or alter the TLS protocol between the buyer and server,” Redmond mentioned of CVE-2024-0056. Microsoft additionally famous that it prevents embedding of FBX recordsdata in Phrase, Excel, PowerPoint, and Outlook in Home windows through default because of a safety factor (CVE-2024-20677, CVSS ranking: 7.8) that would result in far off code execution.
Cybersecurity
“3-D fashions in Place of work paperwork up to now put in from an FBX report will proceed to paintings as anticipated until the 'Hyperlink to Record' possibility is chosen all through set up,” Microsoft mentioned in every other caution. “GLB (Binary GL Transmission Structure) is the reliable alternative 3-D structure to be used in Place of work.” It’s value noting that Microsoft took a equivalent step to prohibit the SketchUp (SKP) report structure in Place of work ultimate yr following Zscaler discovering 117 safety flaws within the Microsoft 365 utility. Instrument Updates from 3rd-Birthday celebration Distributors Along with Microsoft, safety updates have additionally been launched through third-party distributors over the last few weeks to mend quite a few problems, together with –

Did you in finding this newsletter fascinating? Apply us on Twitter  and LinkedIn to learn extra of our content material.

OpenAI
Author: OpenAI

Don't Miss

They’re going to Simply Let Any Outdated Slop Onto The eShop [Update] – Aftermath

They’re going to Simply Let Any Outdated Slop Onto The eShop [Update] – Aftermath

Howdy, so you know the way Nintendo can blame the individual at
Sour APT Goals Turkish Protection Sector with WmRAT and MiyaRAT Malware

Sour APT Goals Turkish Protection Sector with WmRAT and MiyaRAT Malware

Dec 17, 2024 Ravie LakshmananCyber ​​Espionage / Malware A suspected South Asian