Close Menu
Şevket Ayaksız

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Deno’s Latest Update Adds OpenTelemetry Support

    Mayıs 31, 2025

    Neo browser reimagines search with built-in AI assistant

    Mayıs 27, 2025

    Google unveils AI Ultra subscription for power users

    Mayıs 27, 2025
    Facebook X (Twitter) Instagram
    • software
    • Gadgets
    Facebook X (Twitter) Instagram
    Şevket AyaksızŞevket Ayaksız
    Subscribe
    • Home
    • Technology

      Unlock Desktop GPU Power with Asus ROG XG Station 3

      Mayıs 27, 2025

      OpenSilver Expands Cross-Platform Reach with iOS and Android Support

      Mayıs 27, 2025

      Introducing AMD’s 96-Core Threadripper 9000 CPUs: A New Era in Computing

      Mayıs 22, 2025

      AMD’s Radeon RX 9060 XT Delivers Better Value Than Nvidia’s RTX 5060 Ti

      Mayıs 22, 2025

      MSI’s Claw A8 Introduces AMD-Powered Gaming Handheld

      Mayıs 22, 2025
    • Adobe
    • Microsoft
    • java
    • Oracle
    Şevket Ayaksız
    Anasayfa » Windows Update Resolves Critical Zero-Day Security Flaw, Thanks to Microsoft
    Windows

    Windows Update Resolves Critical Zero-Day Security Flaw, Thanks to Microsoft

    By ayaksızAralık 13, 2024Yorum yapılmamış3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Yesterday’s Patch Tuesday marked the last major update of 2024 for Microsoft, which delivered vital security fixes addressing 71 vulnerabilities across various applications and services. Of these, 16 are considered “critical,” with the rest categorized as “high risk.” Most notably, Microsoft has confirmed that one of these vulnerabilities is already being exploited in the wild, making immediate patching essential for all users.

    With 1,020 vulnerabilities patched in 2024, this year stands as the second worst for Microsoft in terms of overall security issues, trailing only behind 2020, which saw 1,250 vulnerabilities fixed. While Microsoft’s Security Update Guide provides minimal details, Trend Micro’s Dustin Childs offers a much more thorough breakdown of Patch Tuesday, tailored to IT administrators overseeing corporate networks.

    Windows Vulnerabilities Addressed

    A large number of this month’s security fixes — 59 in total — target various versions of Windows 10, 11, and Server. As Windows 7 and 8.1 are no longer supported, those using these outdated versions should consider upgrading to Windows 10 22H2 or Windows 11 23H2 to continue receiving critical security patches. It’s worth noting that the Windows 11 24H2 update, though available, still has some issues that might warrant delaying the upgrade.

    Active Exploits in the Wild

    Among the vulnerabilities patched this month, CVE-2024-49138 stands out as one that’s already being actively exploited. This critical buffer overflow flaw in the driver of the shared protocol file system allows attackers to gain elevated privileges. When combined with a Remote Code Execution (RCE) vulnerability, attackers can take full control of the system, leading to severe threats such as ransomware infections.

    Additional Critical Windows Flaws

    Microsoft also addressed 16 critical RCE vulnerabilities across various Windows services. The Remote Desktop service alone accounts for nine of these issues. Although there haven’t been any reported in-the-wild exploits, administrators should prioritize patching these vulnerabilities. One significant issue is CVE-2024-49112, which affects the Lightweight Directory Access Protocol (LDAP). This flaw could allow attackers to execute arbitrary code with elevated privileges without requiring user login. Microsoft advises disconnecting affected domain controllers from the internet as a precaution.

    Additionally, CVE-2024-49117, an RCE vulnerability in Hyper-V, allows attackers to break out from a guest system and execute malicious code on the host system with a simple user login, making it another critical vulnerability to address.

    Office Security Flaws Fixed

    Microsoft also addressed eight security flaws within its Office products, three of which are RCE vulnerabilities. These include issues in Excel, Access, and Outlook. Notably, the Outlook vulnerability (CVE-2024-49065) allows attackers to exploit the file attachment preview feature, though it doesn’t compromise user data directly — it only impacts the availability of the data.

    Post Views: 62
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    ayaksız
    • Website

    Related Posts

    Signal Counters Windows Recall with Screen Security

    Mayıs 22, 2025

    Windows 10 Users Encouraged to Transition to Copilot+ PCs

    Mayıs 1, 2025

    Critical WhatsApp Vulnerability Affects Windows Users

    Nisan 28, 2025
    Add A Comment

    Comments are closed.

    Editors Picks
    8.5

    Apple Planning Big Mac Redesign and Half-Sized Old Mac

    Ocak 5, 2021

    Autonomous Driving Startup Attracts Chinese Investor

    Ocak 5, 2021

    Onboard Cameras Allow Disabled Quadcopters to Fly

    Ocak 5, 2021
    Top Reviews
    9.1

    Review: T-Mobile Winning 5G Race Around the World

    By sevketayaksiz
    8.9

    Samsung Galaxy S21 Ultra Review: the New King of Android Phones

    By sevketayaksiz
    8.9

    Xiaomi Mi 10: New Variant with Snapdragon 870 Review

    By sevketayaksiz
    Advertisement
    Demo
    Şevket Ayaksız
    Facebook X (Twitter) Instagram YouTube
    • Home
    • Adobe
    • microsoft
    • java
    • Oracle
    • Contact
    © 2025 Theme Designed by Şevket Ayaksız.

    Type above and press Enter to search. Press Esc to cancel.