Microsoft addressed 117 Common Vulnerabilities and Exposures (CVE’s) this month, 5 of which were marked as zero-day vulnerabilities. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below:
Microsoft Vulnerabilities:
Windows Zero-Days:
- CVE-2024-43573 – Windows MSHTML Platform Spoofing Vulnerability
- Publicly disclosed & actively being exploited in the wild.
- CVE-2024-43572 – Microsoft Management Console Remote Code Execution Vulnerability
- Publicly disclosed & actively being exploited in the wild.
- CVE-2024-6197 – Open Source Curl Remote Code Execution Vulnerability
- Publicly disclosed vulnerability with 0 reports of being exploited in the wild.
- CVE-2024-43583 – Winlogon Elevation of Privilege Vulnerability
- Publicly disclosed vulnerability with 0 reports of being exploited in the wild.
- CVE-2024-20659 – Windows Hyper-V Security Feature Bypass Vulnerability
- Publicly disclosed vulnerability with 0 reports of being exploited in the wild.
Other Critical CVE’s:
- CVE-2024-43468 – Microsoft Configuration Manager Remote Code Execution Vulnerability
- CVE-2024-43582 – Remote Desktop Protocol Server Remote Code Execution Vulnerability
- CVE-2024-43488 – Visual Studio Code extension for Arduino Remote Code Execution Vulnerability
3rd Party Zero-Days:
Firefox:
- CVE-2024-9680 – Use-after-free in Animation timeline
- Publicly disclosed & actively being exploited in the wild.
- Affects both Firefox and Firefox ESR.
- Fixed in versions Firefox 131.0.2, Firefox ESR 115.16.1, and Firefox ESR 128.3.1.
3rd Party Critical CVE’s:
Adobe Products:
- Adobe released 9 patches covering 52 CVE’s for Animate, Commerce, Dimension, FrameMaker, InCopy, InDesign, Lightroom, Substance 3D Painter and Substance 3D Stager.
Cisco:
Google Chrome:
- Versions 129.0.6688.100/.101 were released for Windows & Apple and version 128.0.6688.100 for Linux on September 10th .
- This update includes 3 Security Fixes.
- Chrome Release: October 8th 2024
Fortinet:
Ivanti:
SAP:
Veeam:
- CVE-2024-40711 From September 4th Actively Exploited in Ransomware Attacks
- NOTE: Active Fortress SRM Vault Customers are Protected against this vulnerability as we have proactively taken the steps to patch / mitigate this back in September.
About FortressSRM Cyber Hygiene Offering:
Software vulnerabilities are one of the top cyber-attack vectors and one in three breaches are the result of vulnerabilities that were known about and should have been already patched.
Keeping operating systems and application software patched and secure is time consuming and tedious – an internal IT resource nightmare. Fortress SRM’s Guardian Managed Patching with Monitoring Service delivers automated, high-efficacy (97%+) updates to Microsoft and over 80 third-party software, ensuring efficient patch deployment to every device, whether on or off network. This includes the deployment of critical updates, security updates, feature updates, operating system upgrades, key Windows security setting and configurations.
The Fortress SRM real-time reporting console includes current patch levels of devices and gives the Client total visibility into what patch related activities have been performed, while real-time patch monitoring provides deep insight into approved, unapproved, pending, and failed patching efforts.
Ready to start the Cyber Hygiene journey? Contact us at: Contact Us | Fortress Security Risk Management (fortresssrm.com)