Security & Threat Updates – November 2024:

Share This Article

Microsoft addressed 89 Common Vulnerabilities and Exposures (CVE’s) this month, 6 which were marked as zero-day vulnerabilities.  The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below:

Microsoft Vulnerabilities:

Windows Zero-Days:

  • CVE-2024-43498 – .NET and Visual Studio Remote Code Execution Vulnerability
    • Publicly disclosed vulnerability with 0 reports of being exploited in the wild.
  • CVE-2024-49039 – Windows Task Scheduler Elevation of Privilege Vulnerability
    • Exploit not publicly disclosed but actively being exploited in the wild.
  • CVE-2024-43451 – NTLM Hash Disclosure Spoofing Vulnerability
    • Publicly disclosed & actively being exploited in the wild.
  • CVE-2024-5535 – OpenSSL: CVE-2024-5535 SSL_select_next_proto buffer overread
    • Publicly disclosed vulnerability with 0 reports of being exploited in the wild.
  • CVE-2024-49019 – Active Directory Certificate Services Elevation of Privilege Vulnerability
    • Publicly disclosed vulnerability with 0 reports of being exploited in the wild.
  • CVE-2024-49040 – Microsoft Exchange Server Spoofing Vulnerability
    • Publicly disclosed vulnerability with 0 reports of being exploited in the wild.

Other Critical CVE’s:

  • CVE-2024-43639 – Windows Kerberos Remote Code Execution Vulnerability
  • CVE-2024-43625 – Microsoft Windows VMSwitch Elevation of Privilege Vulnerability
  • CVE-2024-49056 – Airlift.microsoft.com Elevation of Privilege Vulnerability

3rd Party Critical CVE’s:

Adobe Products:

Cisco:

Citrix:

Dell:

Firefox:

Fortinet:

Google Chrome:

  • Versions 131.0.6778.69/.70 were released for Windows & Apple and version 131.0.6778.69 for Linux on November 12th .
  • This update includes 12 Security Fixes.
  • Chrome Release: November 12th 2024

Ivanti:

SAP:

Veeam:

  • (CVE-2024-40715) – Veeam Backup Enterprise Manager Vulnerability
    • NOTE: Active Fortress SRM Customers – Fortress SRM is working on patching / mitigating this vulnerability this week.

About FortressSRM Cyber Hygiene Offering:

Software vulnerabilities are one of the top cyber-attack vectors and one in three breaches are the result of vulnerabilities that were known about and should have been already patched. 

Keeping operating systems and application software patched and secure is time consuming and tedious – an internal IT resource nightmare. Fortress SRM’s Guardian Managed Patching with Monitoring Service delivers automated, high-efficacy (97%+) updates to Microsoft and over 80 third-party software, ensuring efficient patch deployment to every device, whether on or off network. This includes the deployment of critical updates, security updates, feature updates, operating system upgrades, key Windows security setting and configurations. 

The Fortress SRM real-time reporting console includes current patch levels of devices and gives the Client total visibility into what patch related activities have been performed, while real-time patch monitoring provides deep insight into approved, unapproved, pending, and failed patching efforts.

Ready to start the Cyber Hygiene journey? Contact us at: Contact Us | Fortress Security Risk Management (fortresssrm.com)