Microsoft December 2024 Patch Tuesday Fixes 1 Exploited Zero-Day, 71 Flaws

Summary:
As part of the December Patch Tuesday, Microsoft addressed 71 flaws, including a zero-day vulnerability which is actively being exploited in attacks in the wild. Of the 71 flaws, there were 27 elevation of privilege vulnerabilities, 30 remote code execution vulnerabilities, 7 information disclosure vulnerabilities, 5 denial of service vulnerabilities, and 1 spoofing vulnerabilities. 16 of the vulnerabilities have been rated critical in severity, all of which can lead to remote code execution.

In addition to Microsoft, several other vendors have released updates in December 2024:

Security Officer Comments:
The actively exploited zero-day vulnerability, tracked as CVE-2024-49138, was identified by CrowdStrike's advanced research team. This flaw pertains to an elevation of privilege vulnerability within the Windows Common Log File System (CLFS) driver, which could potentially allow attackers to gain elevated system privileges on affected Windows devices. Notably, this vulnerability does not require user interaction and can be exploited in low-complexity attacks. Although Microsoft has confirmed that CVE-2024-49138 is being actively exploited in the wild, specific details about these ongoing intrusions have not yet been disclosed.

Suggested Corrections:
Organizations should review the list of vulnerabilities resolved and apply the relevant patches as needed. To access the full list of vulnerabilities addressed, please use the link down below:
https://www.bleepingcomputer.com/mi...ts/Microsoft-Patch-Tuesday-December-2024.html

Link(s):
https://www.bleepingcomputer.com/ne...-tuesday-fixes-1-exploited-zero-day-71-flaws/