Microsoft Patch Tuesday : 71 Vulnerabilities Fixed

Home/Internet Security, Security Advisory, Security Update, vulnerability, Zero Day Attack/Microsoft Patch Tuesday : 71 Vulnerabilities Fixed

Microsoft Patch Tuesday : 71 Vulnerabilities Fixed

Microsoft’s final Patch Tuesday of 2024 addresses 71 vulnerabilities, including 16 critical ones and a zero-day. This update highlights Microsoft’s commitment to improving product security and safeguarding users from cyber threats.

Critical Zero-Day Exploited: CVE-2024-49138

CVE-2024-49138, a critical Elevation of Privilege vulnerability in the Windows Common Log File System Driver, was actively exploited before being patched in Microsoft’s December 2024 update.

Discovered by CrowdStrike’s Advanced Research Team, this flaw allows attackers to gain SYSTEM-level privileges, giving them full control over compromised systems.

While exploitation in the wild has been confirmed, specific methods remain undisclosed. Microsoft urges users to apply the patch immediately to secure their systems.

Vulnerabilities Patched

This month’s update addresses 16 critical flaws in Windows Remote Desktop Services, Hyper-V, and LDAP Client, which could enable remote code execution and full system control if exploited.

Key Vulnerabilities and Updates

Microsoft’s December update addresses several severe vulnerabilities:

  • CVE-2024-49106, CVE-2024-49108, CVE-2024-49115: Remote Code Execution flaws in Windows Remote Desktop Services.
  • CVE-2024-49117: Remote Code Execution in Windows Hyper-V.
  • CVE-2024-49124: Remote Code Execution in the LDAP Client.

Administrators are urged to apply these patches immediately to reduce the risk of exploitation.

CISA has also added CVE-2024-43451 to its Known Exploited Vulnerabilities Catalog, further highlighting the need for prompt action.

Beyond critical and zero-day fixes, Microsoft resolved:

  • 30 Remote Code Execution vulnerabilities.
  • 28 Elevation of Privilege flaws.
  • 4 Denial of Service issues.
  • 7 Information Disclosure vulnerabilities.
  • 1 Spoofing flaw and 1 Defense in Depth update.

Prompt patching is essential to safeguard systems from potential threats.

Microsoft December Patch Tuesday: 72 Vulnerabilities Fixed, Critical Updates for Enterprise Systems

CVE NumberCVE TitleImpact
CVE-2024-49106Windows Remote Desktop Services Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49108Windows Remote Desktop Services Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49115Windows Remote Desktop Services Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49117Windows Hyper-V Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49119Windows Remote Desktop Services Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49120Windows Remote Desktop Services Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49122Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49123Windows Remote Desktop Services Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49124Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49126Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49132Windows Remote Desktop Services Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49112Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49116Windows Remote Desktop Services Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49118Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49127Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49128Windows Remote Desktop Services Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-38033PowerShell Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-43594System Center Operations Manager Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49057Microsoft Defender for Endpoint on Android Spoofing VulnerabilitySpoofing
CVE-2024-49059Microsoft Office Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49064Microsoft SharePoint Information Disclosure VulnerabilityInformation Disclosure
CVE-2024-49068Microsoft SharePoint Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49069Microsoft Excel Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49070Microsoft SharePoint Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49073Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49074Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49084Windows Kernel Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49085Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49086Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49087Windows Mobile Broadband Driver Information Disclosure VulnerabilityInformation Disclosure
CVE-2024-49089Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49091Windows Domain Name Service Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49092Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49093Windows Resilient File System (ReFS) Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49094Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49096Microsoft Message Queuing (MSMQ) Denial of Service VulnerabilityDenial of Service
CVE-2024-49097Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49098Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure VulnerabilityInformation Disclosure
CVE-2024-49099Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure VulnerabilityInformation Disclosure
CVE-2024-49101Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49102Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49103Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure VulnerabilityInformation Disclosure
CVE-2024-49104Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49107WmsRepair Service Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49111Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49121Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityDenial of Service
CVE-2024-49125Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49129Windows Remote Desktop Gateway (RD Gateway) Denial of Service VulnerabilityDenial of Service
CVE-2024-49142Microsoft Access Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-43600Microsoft Office Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49062Microsoft SharePoint Information Disclosure VulnerabilityInformation Disclosure
CVE-2024-49063Microsoft/Muzic Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49065Microsoft Office Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49072Windows Task Scheduler Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49075Windows Remote Desktop Services Denial of Service VulnerabilityDenial of Service
CVE-2024-49076Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49077Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49078Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49079Input Method Editor (IME) Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49080Windows IP Routing Management Snapin Remote Code Execution VulnerabilityRemote Code Execution
CVE-2024-49081Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49082Windows File Explorer Information Disclosure VulnerabilityInformation Disclosure
CVE-2024-49083Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49088Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49090Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49095Windows PrintWorkflowUserSvc Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49109Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49110Windows Mobile Broadband Driver Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49113Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityDenial of Service
CVE-2024-49114Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityElevation of Privilege
CVE-2024-49138Windows Common Log File System Driver Elevation of Privilege VulnerabilityElevation of Privilege
ADV240002Microsoft Office Defense in Depth UpdateDefense in Depth

Microsoft has introduced a hotpatching preview for Windows 11 Enterprise 24H2 and Windows 365 Enterprise, reducing annual reboots from twelve to four to minimize downtime.

As 2024 ends, Microsoft advances its Secure Future Initiative, preparing for a 2025 OS launch featuring a secure kernel, stricter app controls, and enhanced AI, as Windows 10 transitions to Extended Security Updates.

The December 2024 Patch Tuesday highlights the importance of timely updates, urging users to apply patches promptly to safeguard systems against evolving cyber threats.

By | 2024-12-13T23:06:56+05:30 December 11th, 2024|Internet Security, Security Advisory, Security Update, vulnerability, Zero Day Attack|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!