On April Patch Tuesday, Microsoft fixed 149 bugs—one of the biggest security update releases in the company’s history.
Many of its software products, such as Microsoft Office and its SQL Server database package, have fixed vulnerabilities.
The majority of vulnerabilities are in the Windows operating system, and nine CVEs were found in the Azure cloud platform.
Three of the 149 issues are classified as Critical, 142 as Important, three as Moderate, and one as Low in severity.
The update also addresses a vulnerability tracked as CVE-2024-26234, which is currently being exploited.
Proxy driver spoofing vulnerability is tracked as CVE-2024-26234 and has a CVSS rating 6.7.
An attacker would require high privileges to take over the system, exploit the vulnerability, and spoof the proxy driver.
Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Stopping 99% of phishing attacks missed by other email security solutions. .
Microsoft fixed this zero-day vulnerability that impacted Windows desktop and server operating systems and was made public.
Administrators should promptly install the Windows cumulative update on their systems to prevent a security compromise, as this vulnerability is actively exploited in the wild.
This vulnerability, which has a CVSS base score of 7.2, is classified as critical for Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
“Successful exploitation of this vulnerability requires the attacker to be an administrator of the web application. As is best practice, regular validation and audits of administrative groups should be conducted”, Microsoft said.
Microsoft Defender for IoT Remote Code Execution Vulnerability has a base CVSS score of 8.8.
For the IoT sensor to successfully exploit this issue, the attacker must be able to deliver a malicious update package over the network to the Defender.
The attacker first needs to establish their identity and obtain the required authorization to start the update procedure.
“Successfully exploiting this path traversal vulnerability would require an attacker to send a tar file to the Defender for IoT sensor.”
Microsoft said that after the extraction process, the attacker could send unsigned update packages and overwrite any file they chose.
This is also a critical Microsoft Defender for IoT, Remote Code Execution Vulnerability, with a CVSS base score of 8.8.
Any authorized attacker can exploit this vulnerability. Admin or other advanced rights are not needed.
“An authenticated attacker with access to the file upload feature could exploit this path traversal vulnerability by uploading malicious files to sensitive locations on the server,” Microsoft.
Additionally, 41 SQL Server fixes have been released, all of which address issues related to remote code execution.
In addition to the vulnerabilities addressed in this month’s Patch Tuesday release, Microsoft has republished six CVEs.
It is recommended that users upgrade the impacted products to prevent threat actors from exploiting these vulnerabilities.
Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.
A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed…
Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria Stealer,"…
Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass,…
The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated…
Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations designed…
A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated, state-sponsored…