Article Details
Scrape Timestamp (UTC): 2024-09-10 17:37:06.262
Original Article Text
Click to Toggle View
Microsoft September 2024 Patch Tuesday fixes 4 zero-days, 79 flaws. Today is Microsoft's September 2024 Patch Tuesday, which includes security updates for 79 flaws, including four actively exploited and one publicly disclosed zero-days. This Patch Tuesday fixed seven critical vulnerabilities, which were either remote code execution or elevation of privileges flaws. The number of bugs in each vulnerability category is listed below: Four zero-days disclosed This month's Patch Tuesday fixes four actively exploited, one of which was publicly disclosed. Microsoft classifies a zero-day flaw as one that is publicly disclosed or actively exploited while no official fix is available. The four actively exploited zero-day vulnerabilities in today's updates are: CVE-2024-38014 - Windows Installer Elevation of Privilege Vulnerability This vulnerability allows attacks to gain SYSTEM privileges on Windows systems. Microsoft has not shared any details on how it was exploited in attacks. The flaw was discovered by Michael Baer with SEC Consult Vulnerability Lab. CVE-2024-38217 - Windows Mark of the Web Security Feature Bypass Vulnerability This flaw was publicly disclosed last month by Joe Desimone of Elastic Security and is believed to have been actively exploited since 2018. In the report, Desimone outlined a technique called LNK stomping that allows specially crafted LNK files with non-standard target paths or internal structures to cause the file to be opened while bypassing Smart App Control and the Mark of the Web security warnings. "An attacker can craft a malicious file that would evade Mark of the Web (MOTW) defenses, resulting in a limited loss of integrity and availability of security features such as SmartScreen Application Reputation security check and/or the legacy Windows Attachment Services security prompt," explains Microsoft's advisory. When exploited, it causes the command in the LNK file to be executed without a warning, as demonstrated in this video. CVE-2024-38226 - Microsoft Publisher Security Feature Bypass Vulnerability Microsoft fixed a Microsoft Publisher flaw that bypasses the security protections against embedded macros in downloaded documents. "An attacker who successfully exploited this vulnerability could bypass Office macro policies used to block untrusted or malicious files," explains Microsoft's advisory. Microsoft has not shared who disclosed the flaw and how it was exploited. CVE-2024-43491 - Microsoft Windows Update Remote Code Execution Vulnerability Microsoft fixed a servicing stack flaw that allows remote code execution. "Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015)," explains Microsoft's advisory. "This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have installed the Windows security update released on March 12, 2024—KB5035858 (OS Build 10240.20526) or other updates released until August 2024. All later versions of Windows 10 are not impacted by this vulnerability." "This servicing stack vulnerability is addressed by installing the September 2024 Servicing stack update (SSU KB5043936) AND the September 2024 Windows security update (KB5043083), in that order." This flaw only impacts Windows 10, version 1507, which reached the end of life in 2017. However, it also impacts Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB editions, which are still under support. This flaw is interesting because it caused Optional Components, such as Active Directory Lightweight Directory Services, XPS Viewer, Internet Explorer 11, LPD Print Service, IIS, and Windows Media Player to roll back to their original RTM versions. This caused any previous CVE to be reintroduced into the program, which could then be exploited. More details about the flaw and the complete list of affected components can found in Microsoft's advisory. Microsoft has not shared who disclosed the flaw and how it was exploited. Recent updates from other companies Other vendors who released updates or advisories in September 2024 include: The September 2024 Patch Tuesday Security Updates Below is the complete list of resolved vulnerabilities in the September 2024 Patch Tuesday updates. To access the full description of each vulnerability and the systems it affects, you can view the full report here.
Daily Brief Summary
Microsoft's September 2024 Patch Tuesday addressed 79 vulnerabilities, with seven classified as critical.
Four zero-day vulnerabilities were actively exploited, and one was previously disclosed but not fixed.
Notable vulnerabilities include breaches allowing remote code execution and elevation of privileges.
CVE-2024-38014 is an elevation of privilege flaw in Windows Installer, allowing SYSTEM access without detailed exploitation information.
CVE-2024-38217, a Windows Mark of the Web bypass issue, detailed for use in evading security measures since 2018.
CVE-2024-38226 involves bypassing security in Microsoft Publisher to execute embedded macros.
CVE-2024-43491, a servicing stack flaw in older Windows 10 versions, allowed previously-fixed vulnerabilities to be exploited again.
Updates related to resolving these issues impact various Microsoft platforms, including older and still-supported editions of Windows 10.