Thursday, November 28, 2024
HomeCVE/vulnerabilityMicrosoft Patches Multiple Vulnerabilities Allow Attackers to Elevate Privileges

Microsoft Patches Multiple Vulnerabilities Allow Attackers to Elevate Privileges

Published on

Microsoft has recently released patches addressing multiple vulnerabilities that could enable attackers to elevate privileges across various Microsoft products.

The patches are part of Microsoft’s continuous efforts to enhance security and protect its users from threats.

The Microsoft Security Response Center (MSRC) has been actively investigating these vulnerabilities to provide timely and effective security updates.

- Advertisement - SIEM as a Service

Microsoft Patches Multiple Vulnerabilities

Several patched vulnerabilities have been classified as “Important” due to their potential impact on system security.

Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.

These vulnerabilities span a range of Microsoft products, from the .NET Framework to Microsoft Exchange Server. Here is a detailed overview of the vulnerabilities and their respective patches:

CVE IDVulnerability DescriptionImpactAffected Product
CVE-2024-29059.NET Framework Information Disclosure VulnerabilityInformation Disclosure.NET Framework
CVE-2024-28916Xbox Crypto Graphic Services Elevation of PrivilegeElevation of PrivilegeXbox Crypto Graphic Services
CVE-2024-26204Outlook for Android Information Disclosure VulnerabilityInformation DisclosureOutlook for Android
CVE-2024-26203Azure Data Studio Elevation of Privilege VulnerabilityElevation of PrivilegeAzure Data Studio
CVE-2024-26201Microsoft Intune Linux Agent Elevation of Privilege VulnerabilityElevation of PrivilegeMicrosoft Intune
CVE-2024-26199Microsoft Office Elevation of Privilege VulnerabilityElevation of PrivilegeMicrosoft Office
CVE-2024-26198Microsoft Exchange Server Remote Code Execution VulnerabilityRemote Code ExecutionMicrosoft Exchange Server
CVE-2024-26197Windows Standards-Based Storage Management Service Denial of Service VulnerabilityDenial of ServiceWindows Standards-Based Storage Management Service

The impact of these vulnerabilities can be significant, allowing attackers to gain elevated privileges and access sensitive information.

Users and administrators are strongly advised to apply these updates as soon as possible to mitigate potential security risks.

Microsoft continues to prioritize the security of its products and services, emphasizing the importance of keeping systems up to date with the latest patches.

Regular system updates and vigilance in applying security patches are crucial in defending against potential cyber threats.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

“Bootkitty” – A First Ever UEFI Bootkit Attack Linux Systems

Cybersecurity researchers have uncovered the first-ever UEFI bootkit designed to target Linux systems.This...

Matrix, A Single Actor Orchestrate Global DDOS Attack Campaign

Cybersecurity researchers have uncovered a widespread Distributed Denial-of-Service (DDoS) campaign attributed to a threat...

Europol Dismantled Major Illegal IPTV Streaming Network Providers

In a major crackdown on illegal streaming, law enforcement authorities across Europe, supported by...

Why the MITRE ATT&CK Evaluation Is Essential for Security Leaders

In today’s dynamic threat landscape, security leaders are under constant pressure to make informed...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

“Bootkitty” – A First Ever UEFI Bootkit Attack Linux Systems

Cybersecurity researchers have uncovered the first-ever UEFI bootkit designed to target Linux systems.This...

Matrix, A Single Actor Orchestrate Global DDOS Attack Campaign

Cybersecurity researchers have uncovered a widespread Distributed Denial-of-Service (DDoS) campaign attributed to a threat...

Europol Dismantled Major Illegal IPTV Streaming Network Providers

In a major crackdown on illegal streaming, law enforcement authorities across Europe, supported by...