As part of the May 2024 Patch Tuesday update, Microsoft has addressed a total of 61 new security vulnerabilities in its software, including two widely exploited zero-day vulnerabilities.
Of the 61 defects, 1 defect was rated as Critical, 59 defects were rated as Important, and 1 defect was rated as Moderate. Over the past month, the Chromium-based Edge browser has addressed 30 vulnerabilities, including two recently disclosed zero-day vulnerabilities (CVE-2024-4671 and CVE-2024-4761) that have been flagged as being exploited in attacks. use.
Two security flaws that have been weaponized in the wild are as follows:
- CVE-2024-30040 (CVSS Rating: 8.8) – Windows MSHTML Platform Security Feature Bypass Vulnerability
- CVE-2024-30051 (CVSS score: 7.8) – Windows Desktop Window Manager (DWM) core library elevation of privilege vulnerability
“An unauthenticated attacker who successfully exploited this vulnerability could gain code execution privileges by convincing a user to open a malicious file, at which point the attacker would be able to execute arbitrary code.
However, successful exploitation of the vulnerability would require an attacker to convince users to load a specially crafted file onto a vulnerable system, distribute it via email or instant message, and trick them into operating on it. Interestingly, victims do not have to click or open the malicious archive to initiate the infection.
CVE-2024-30051, on the other hand, could allow threat actors to gain system privileges. Three teams of researchers from Kaspersky, DBAPPSecurity WeBin Lab, Google Threat Analysis Group, and Mandiant discovered and reported the vulnerability, indicating that it could be widely exploited.
“We have seen it used with QakBot and other malware and believe multiple threat actors have access to it,” Kaspersky researchers Boris Larin and Mert Degirmenci said.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the two vulnerabilities to its Known Exploitable Vulnerabilities (KEV) catalog, requiring federal agencies to apply the latest fixes by June 4, 2024.
Microsoft also resolved multiple remote code execution bugs, including nine bugs affecting the Windows Mobile Broadband driver and seven bugs affecting the Windows Routing and Remote Access Service (RRAS).
Other notable flaws include privilege escalation flaws in the Common Journal File System (CLFS) driver – CVE-2024-29996, CVE-2024-30025 (CVSS score: 7.8), and CVE-2024-30037 (CVSS score: 7.5) – Win32k (CVE-2024-30028 and CVE-2024-30030, CVSS score: 7.8), Windows Search Service (CVE-2024-30033, CVSS score: 7.0), and Windows Core (CVE-2024-30018, SS87.).
In March 2024, Kaspersky revealed that threat actors were trying to actively exploit now-patched privilege escalation flaws in various Windows components because “it’s a very easy way to get a quick NT AUTHORITY\SYSTEM.”
Akamai further outlined a new privilege escalation technique affecting Active Directory (AD) environments that leverages the DHCP Administrators group.
“If the DHCP server role is installed on a domain controller (DC), this may allow them to gain domain administrative rights,” the company notes. “In addition to providing privilege escalation primitives, the same technology can also be used to Create a stealth domain persistence mechanism.”
The last one is a security feature bypass vulnerability (CVE-2024-30050, CVSS score: 5.4) affecting Windows Mark-of-the-Web (MotW), which can be exploited through malicious files to evade defenses.
Microsoft, which has been heavily criticized recently for a series of security breaches that allowed state actors in China and Russia to compromise its infrastructure, has instituted a series of measures to prioritize security over all other product features as part of its security program .
“In addition, we will instill accountability based on a portion of the company’s senior leadership team’s compensation based on our progress toward security initiatives and milestones,” said Charlie Bell, executive vice president of security at Microsoft.
Software patches from other vendors
In addition to Microsoft, other vendors have released security updates over the past few weeks to fix multiple vulnerabilities, including:
31 Comments
Pingback: Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities – Tech Empire Solutions
Pingback: Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities – Mary Ashley
Pingback: Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities – Paxton Willson
There is noticeably a bundle to know about this. I assume you made certain nice points in features also.
Aw, this was a really nice post. In concept I want to put in writing like this additionally – taking time and precise effort to make an excellent article… but what can I say… I procrastinate alot and in no way appear to get something done.
Great write-up, I am regular visitor of one’s blog, maintain up the nice operate, and It is going to be a regular visitor for a long time.
F*ckin’ awesome things here. I’m very glad to see your article. Thanks a lot and i am looking forward to contact you. Will you kindly drop me a e-mail?
I’m still learning from you, while I’m trying to reach my goals. I definitely liked reading everything that is written on your blog.Keep the aarticles coming. I liked it!
Very interesting info !Perfect just what I was searching for!
Howdy just wanted to give you a quick heads up. The text in your article seem to be running off the screen in Firefox. I’m not sure if this is a format issue or something to do with browser compatibility but I thought I’d post to let you know. The layout look great though! Hope you get the problem resolved soon. Thanks
naturally like your web-site but you have to check the spelling on several of your posts. Several of them are rife with spelling issues and I in finding it very troublesome to inform the reality on the other hand I¦ll surely come again again.
It’s hard to search out educated people on this topic, but you sound like you realize what you’re talking about! Thanks
Hey would you mind sharing which blog platform you’re working with? I’m planning to start my own blog soon but I’m having a hard time choosing between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your layout seems different then most blogs and I’m looking for something unique. P.S Apologies for being off-topic but I had to ask!
I am glad to be one of several visitors on this great internet site (:, thanks for posting.
Very interesting points you have observed, regards for putting up. “I never said most of the things I said.” by Lawrence Peter Berra.
Thank you, I have recently been searching for information approximately this subject for ages and yours is the greatest I’ve found out so far. However, what concerning the bottom line? Are you certain about the source?
Business dicker Great information shared.. really enjoyed reading this post thank you author for sharing this post .. appreciated
Techno rozen Nice post. I learn something totally new and challenging on websites
Mygreat learning very informative articles or reviews at this time.
Valuable info. Lucky me I found your website by accident, and I am shocked why this accident did not happened earlier! I bookmarked it.
Nice post. I was checking constantly this blog and I am impressed! Extremely useful information specially the last part 🙂 I care for such information a lot. I was seeking this certain info for a long time. Thank you and good luck.
Great write-up, I’m regular visitor of one’s web site, maintain up the nice operate, and It’s going to be a regular visitor for a long time.
Good day! I could have sworn I’ve been to this site before but after checking through some of the post I realized it’s new to me. Nonetheless, I’m definitely glad I found it and I’ll be bookmarking and checking back frequently!
SocialMediaGirls I very delighted to find this internet site on bing, just what I was searching for as well saved to fav
Touch to Unlock I just like the helpful information you provide in your articles
Fran Candelera This is really interesting, You’re a very skilled blogger. I’ve joined your feed and look forward to seeking more of your magnificent post. Also, I’ve shared your site in my social networks!
Blue Techker naturally like your web site however you need to take a look at the spelling on several of your posts. A number of them are rife with spelling problems and I find it very bothersome to tell the truth on the other hand I will surely come again again.
Thinker Pedia Hi there to all, for the reason that I am genuinely keen of reading this website’s post to be updated on a regular basis. It carries pleasant stuff.
Thinker Pedia For the reason that the admin of this site is working, no uncertainty very quickly it will be renowned, due to its quality contents.
Aroma Sensei Pretty! This has been a really wonderful post. Many thanks for providing these details.
Perfectly composed written content, Really enjoyed reading through.