Microsoft Warns of Active Zero-Day Exploitation, Patches 60 Windows Vulnerabilities

Share This Post

Microsoft rolled out its latest security updates on Tuesday, addressing approximately 60 vulnerabilities across various software products and called urgent attention to an actively exploited zero-day reported by multiple external threat-hunting teams.

The zero-day bug, tagged as CVE-2024-30051, is documented as a heap-based buffer overflow in the Windows Desktop Window Manager (DWM) Core Library that’s already been exploited in malware attacks that require elevated SYSTEM privileges.

The bug carries a CVSS severity score of 7.8/10 and an “important” rating from Redmond.

Microsoft credited security researchers from Kaspersky, DBAPPSecurity, and Google’s Threat Analysis Group for identifying and reporting the issue, suggesting it may have already been used beyond targeted attacks.

As is customary, Microsoft did not share details on the exploitation of IOCs to help defenders hunt for signs of intrusions.

Microsoft also marked CVE-2024-30040 in the already-exploited category, warning that attackers are bypassing security features in Microsoft 365 and Office. The flaw, which carries a CVSS score of 8.8, allows attackers to execute arbitrary code if a user is tricking into loading malicious files. 

“This vulnerability bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE controls. An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could execute arbitrary code in the context of the user,” Microsoft said.

The company also urged Windows admins to pay attention to CVE-2024-30044, a critical-severity remote code execution vulnerability in Microsoft Sharepoint.

Advertisement. Scroll to continue reading.

“An authenticated attacker with Site Owner permission can use the vulnerability to inject arbitrary code and execute this code in the context of SharePoint Server,” Redmond’s security response center warned.

“An authenticated attacker with Site Owner permissions or higher could upload a specially crafted file to the targeted Sharepoint Server and craft specialized API requests to trigger deserialization of file’s parameters. This would enable the attacker to perform remote code execution in the context of the Sharepoint Server,” Microsoft added.

Related: Adobe Patches Critical Flaws in Reader, Acrobat

Related: Apple Patch Day: Code Execution Flaws in iPhones, iPads, macOS

Related: Exploited Chrome Zero-Day Patched by Google

Related: SAP Patches Critical Vulnerabilities in CX Commerce, NetWeaver

Related: VMware Patches Vulnerabilities Exploited at Pwn2Own 2024

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.