{"id":25452,"date":"2024-11-12T16:17:09","date_gmt":"2024-11-13T00:17:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/11\/12\/news-19182\/"},"modified":"2024-11-12T16:17:09","modified_gmt":"2024-11-13T00:17:09","slug":"news-19182","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/11\/12\/news-19182\/","title":{"rendered":"Microsoft Patch Tuesday, November 2024 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 12 Nov 2024 21:59:46 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today released updates to plug at least 89 security holes in its <strong>Windows<\/strong> operating systems and other software. November&#8217;s patch batch includes fixes for two zero-day vulnerabilities that are already being exploited by attackers, as well as two other flaws that were publicly disclosed prior to today.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-56287\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\" alt=\"\" width=\"749\" height=\"527\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png 841w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-768x541.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-782x550.png 782w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-100x70.png 100w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/p>\n<p>The zero-day flaw tracked as <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49039\" target=\"_blank\" rel=\"noopener\">CVE-2024-49039<\/a> is a bug in the <strong>Windows Task Scheduler<\/strong> that allows an attacker to increase their privileges on a Windows machine. Microsoft credits Google&#8217;s <strong>Threat Analysis Group<\/strong> with reporting the flaw.<\/p>\n<p>The second bug fixed this month that is already seeing in-the-wild exploitation is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43451\" target=\"_blank\" rel=\"noopener\">CVE-2024-43451<\/a>, a spoofing flaw that could reveal\u00a0<a href=\"https:\/\/www.ired.team\/offensive-security\/initial-access\/netntlmv2-hash-stealing-using-outlook\" target=\"_blank\" rel=\"noopener\">Net-NTLMv2 hashes<\/a>, which are used for authentication in Windows environments.<\/p>\n<p><strong>Satnam Narang<\/strong>, senior staff research engineer at <strong>Tenable<\/strong>, says the danger with stolen NTLM hashes is that they enable so-called &#8220;pass-the-hash&#8221; attacks, which let an attacker masquerade as a legitimate user without ever having to log in or know the user&#8217;s password. Narang notes that CVE-2024-43451 is the third NTLM zero-day so far this year.<\/p>\n<p>&#8220;Attackers continue to be adamant about discovering and exploiting zero-day vulnerabilities that can disclose NTLMv2 hashes, as they can be used to authenticate to systems and potentially move laterally within a network to access other systems,&#8221; Narang said.<span id=\"more-69463\"><\/span><\/p>\n<p>The two other publicly disclosed weaknesses Microsoft patched this month are <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49019\" target=\"_blank\" rel=\"noopener\">CVE-2024-49019<\/a>, an elevation of privilege flaw in <strong>Active Directory Certificate Services<\/strong> (AD CS); and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49040\" target=\"_blank\" rel=\"noopener\">CVE-2024-49040<\/a>, a spoofing vulnerability in <strong>Microsoft Exchange Server<\/strong>.<\/p>\n<p><strong>Ben McCarthy<\/strong>, lead cybersecurity engineer at <strong>Immersive Labs<\/strong>, called special attention to <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43602\" target=\"_blank\" rel=\"noopener\">CVE-2024-43602<\/a>, a remote code execution vulnerability in <strong>Windows Kerberos<\/strong>, the authentication protocol that is heavily used in Windows domain networks.<\/p>\n<p>&#8220;This is one of the most threatening CVEs from this patch release,&#8221; McCarthy said. &#8220;Windows domains are used in the majority of enterprise networks, and by taking advantage of a cryptographic protocol vulnerability, an attacker can perform privileged acts on a remote machine within the network, potentially giving them eventual access to the domain controller, which is the goal for many attackers when attacking a domain.&#8221;<\/p>\n<p>McCarthy also pointed to <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43498\" target=\"_blank\" rel=\"noopener\">CVE-2024-43498<\/a>, a remote code execution flaw in <strong>.NET<\/strong> and <strong>Visual Studio<\/strong> that could be used to install malware. This bug has earned a CVSS severity rating of 9.8 (10 is the worst).<\/p>\n<p>Finally, at least 29 of the updates released today tackle memory-related security issues involving <strong>SQL server<\/strong>, each of which earned a threat score of 8.8. Any one of these bugs could be used to install malware if an authenticated user connects to a malicious or hacked SQL database server.<\/p>\n<p>For a more detailed breakdown of today&#8217;s patches from Microsoft, check out the <a href=\"https:\/\/isc.sans.edu\/diary\/Microsoft%20November%202024%20Patch%20Tuesday\/31438\" target=\"_blank\" rel=\"noopener\">SANS Internet Storm Center\u2019s list<\/a>. For administrators in charge of managing larger Windows environments, it pays to keep an eye on <a href=\"https:\/\/www.askwoody.com\/\" target=\"_blank\" rel=\"noopener\">Askwoody.com<\/a>, which frequently points out when specific Microsoft updates are creating problems for a number of users.<\/p>\n<p>As always, if you experience any problems applying any of these updates, consider dropping a note about it in the comments; chances are excellent that someone else reading here has experienced the same issue, and maybe even has found a solution.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2024\/11\/microsoft-patch-tuesday-november-2024-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 12 Nov 2024 21:59:46 +0000<\/strong><\/p>\n<p>Microsoft today released updates to plug at least 89 security holes in its Windows operating systems and other software. November&#8217;s patch batch includes fixes for two zero-day vulnerabilities that are already being exploited by attackers, as well as two other flaws that were publicly disclosed prior to today.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[32124,32125,32126,32127,32128,32129,32130,20501,17220,20502,16936],"class_list":["post-25452","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-cve-2024-43451","tag-cve-2024-43602","tag-cve-2024-49019","tag-cve-2024-49039","tag-cve-2024-49040","tag-google-tag","tag-microsoft-patch-tuesday-november-2024","tag-satnam-narang","tag-security-tools","tag-tenable","tag-time-to-patch"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25452"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25452\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}