close
close

topicnews · September 11, 2024

Patchday Microsoft: Attackers attack four gaps in Windows & Co.

Patchday Microsoft: Attackers attack four gaps in Windows & Co.

Attackers are currently exploiting four security holes in Publisher and Windows. In the worst case, malicious code can get onto systems and completely compromise PCs. Security patches are available for download via Windows Update. The service is usually set by default to install updates automatically.

Advertisement


One of the attacked vulnerabilities (CVE-2024-43491) is “critical” and affects certain versions of Windows 10 32-bit and 64-bit. Accordingly, Windows 10 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) is also vulnerable with security updates from March of this year. Microsoft provides further information in a post.

The vulnerability affects the servicing stack and removes the protection of certain older security patches for optional components such as XPS Viewer. Attackers can exploit the vulnerabilities again to attack systems.

The second vulnerability exploited by attackers (CVE-2024-38217 “medium”) concerns the Mark of the Web protection mechanism. The approach indicates that files downloaded from the Internet are potentially dangerous. Attackers can circumvent this and slip victims a file prepared with malicious code. In addition to Windows 10 and 11, several Windows Server versions are also at risk.

This is also the case with the third vulnerability attacked (CVE-2024-38014 “high”) the fall. At this point, attackers can gain system rights. How such attacks work in detail is currently unknown.

The fourth vulnerability attacked (CVE-2024-38226 “high”) affects Microsoft Publisher. Here, attackers circumvent the function for blocking macros in Office documents. In this way, they circulate prepared documents that execute malicious code via the macro function. The extent to which the attacks described take place is currently unknown.

In addition, Microsoft has closed gaps in AllJoyn, Azure, Dynamics 365, SharePoint and SQL Server, among others. These areas allow attackers to execute malicious code or gain higher user rights.

Further information on all vulnerabilities closed on this patch day can be found in Microsoft’s Security Update Guide.


(of)