{"id":25556,"date":"2024-12-10T19:17:04","date_gmt":"2024-12-11T03:17:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/12\/10\/news-19285\/"},"modified":"2024-12-10T19:17:04","modified_gmt":"2024-12-11T03:17:04","slug":"news-19285","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/12\/10\/news-19285\/","title":{"rendered":"Patch Tuesday, December 2024 Edition"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Wed, 11 Dec 2024 01:53:13 +0000<\/strong><\/p>\n<p><strong>Microsoft<\/strong> today released updates to plug at least 70 security holes in <strong>Windows<\/strong> and Windows software, including one vulnerability that is already being exploited in active attacks.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-56287\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\" alt=\"\" width=\"749\" height=\"527\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png 841w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-768x541.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-782x550.png 782w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-100x70.png 100w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/p>\n<p>The zero-day seeing exploitation involves <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49138\" target=\"_blank\" rel=\"noopener\">CVE-2024-49138<\/a>, a security weakness in the <strong>Windows Common Log File System<\/strong> (CLFS) driver &#8212; used by applications to write transaction logs &#8212; that could let an authenticated attacker gain &#8220;system&#8221; level privileges on a vulnerable Windows device.<\/p>\n<p>The security firm <strong>Rapid7<\/strong> notes there have been a series of zero-day elevation of privilege flaws in CLFS over the past few years.<\/p>\n<p>&#8220;Ransomware authors who have abused previous CLFS vulnerabilities will be only too pleased to get their hands on a fresh one,&#8221; wrote <strong>Adam Barnett<\/strong>, lead software engineer at Rapid7. &#8220;Expect more CLFS zero-day vulnerabilities to emerge in the future, at least until Microsoft performs a full replacement of the aging CLFS codebase instead of offering spot fixes for specific flaws.&#8221;<\/p>\n<p>Elevation of privilege vulnerabilities accounted for 29% of the 1,009 security bugs Microsoft has patched so far in 2024, according to a year-end tally by <strong>Tenable<\/strong>; nearly 40 percent of those bugs were weaknesses that could let attackers run malicious code on the vulnerable device.<span id=\"more-69721\"><\/span><\/p>\n<p><strong>Rob Reeves<\/strong>, principal security engineer at <strong>Immersive Labs<\/strong>, called special attention to <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49112\" target=\"_blank\" rel=\"noopener\">CVE-2024-49112<\/a>, a remote code execution flaw in the <strong>Lightweight Directory Access Protocol<\/strong> (LDAP) service <em>on every version of Windows since Windows 7.\u00a0<\/em>CVE-2024-49112 has been assigned a CVSS (badness) score of 9.8 out of 10.<\/p>\n<p>&#8220;LDAP is most commonly seen on servers that are Domain Controllers inside a Windows network and LDAP must be exposed to other servers and clients within an enterprise environment for the domain to function,&#8221; Reeves said. &#8220;Microsoft hasn\u2019t released specific information about the vulnerability at present, but has indicated that the attack complexity is low and authentication is not required.&#8221;<\/p>\n<p><strong>Tyler Reguly<\/strong> at the security firm <strong>Fortra<\/strong> had a slightly different 2024 patch tally for Microsoft, at 1,088 vulnerabilities, which he said was surprisingly similar to the 1,063 vulnerabilities resolved in 2023 and the 1,119 vulnerabilities resolved in 2022.<\/p>\n<p>&#8220;If nothing else, we can say that Microsoft is consistent,&#8221; Reguly said. &#8220;While it would be nice to see the number of vulnerabilities each year decreasing, at least consistency lets us know what to expect.&#8221;<\/p>\n<p>If you&#8217;re a Windows end user and your system is not set up to automatically install updates, please take a minute this week to run Windows Update, preferably after backing up your system and\/or important data.<\/p>\n<p>System admins should keep an eye on <a href=\"https:\/\/www.askwoody.com\" target=\"_blank\" rel=\"noopener\">AskWoody.com<\/a>, which usually has the details if any of the Patch Tuesday fixes are causing problems. In the meantime, if you run into any problems applying this month&#8217;s fixes, please drop a note about in the comments below.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2024\/12\/patch-tuesday-december-2024-edition\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Wed, 11 Dec 2024 01:53:13 +0000<\/strong><\/p>\n<p>Microsoft today released updates to plug at least 70 security holes in Windows and Windows software, including one vulnerability that is already being exploited in active attacks. The zero-day seeing exploitation involves CVE-2024-49138, a security weakness in the Windows Common\u2026 <span class=\"read-more\"><a href=\"https:\/\/krebsonsecurity.com\/2024\/12\/patch-tuesday-december-2024-edition\/\">Read More &#187;<\/a><\/span><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[29353,32204,32205,28567,24626,25690,32206,32207,10644,15086,32208,20502,31636,32209],"class_list":["post-25556","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adam-barnett","tag-cve-2024-49112","tag-cve-2024-49138","tag-fortra","tag-immersive-labs","tag-ldap","tag-lightweight-directory-access-protocol","tag-microsoft-patch-tuesday-december-2024","tag-other","tag-rapid7","tag-rob-reeves","tag-tenable","tag-tyler-reguly","tag-windows-common-log-file-system-clfs-driver"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25556"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25556\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}