October 2024 Patch Tuesday October 2024 Patch Tuesday

October 8, 2024

What Are We Patching This Tuesday?

In this Patch Tuesday edition, Microsoft addressed 117 CVEs, including 5 Zero-Days, 3 Criticals, 113 Important and 1 Moderate. Two of the 5 Zero-Days are actively exploited in the wild.

Patch Tuesday Counts October 2024

From an Impact perspective, Escalation of Privilege (EoP) vulnerabilities accounted for 23%, followed by Remote Code Execution (RCE) at 38% and Denial of Service (DoS) at 21%.

CVE Patch Breakdown October 2024

Patches for this month cover components for the following areas:

  • .NET and Visual Studio
  • Azure
  • DeepSpeed
  • Internet Small Computer Systems Interface (iSCSI)
  • Microsoft ActiveX
  • Microsoft Configuration Manager
  • Microsoft Defender for Endpoint
  • Microsoft Graphics Component
  • Microsoft Management Console
  • Microsoft Office
  • Microsoft Office SharePoint
  • Microsoft Office Visio
  • Microsoft Simple Certificate Enrollment Protocol
  • Microsoft WDAC OLE DB provider for SQL
  • Microsoft Windows Speech
  • OpenSSH for Windows
  • Outlook for Android
  • Power BI
  • Remote Desktop Client
  • RPC Endpoint Mapper Service
  • Service Fabric
  • Sudo for Windows
  • Visual C++ Redistributable Installer
  • Visual Studio
  • Visual Studio Code
  • Windows Ancillary Function Driver for WinSock
  • Windows BitLocker
  • Windows Common Log File System Driver
  • Windows Cryptographic Services
  • Windows EFI Partition
  • Windows Hyper-V
  • Windows Kerberos
  • Windows Kernel
  • Windows Kernel-Mode Drivers
  • Windows Local Security Authority (LSA)
  • Windows Mobile Broadband
  • Windows MSHTML Platform
  • Windows Netlogon
  • Windows Network Address Translation (NAT)
  • Windows NT OS Kernel
  • Windows NTFS
  • Windows Online Certificate Status Protocol (OCSP)
  • Windows Print Spooler Components
  • Windows Remote Desktop
  • Windows Remote Desktop Licensing Service
  • Windows Remote Desktop Services
  • Windows Resilient File System (ReFS)
  • Windows Routing and Remote Access Service (RRAS)
  • Windows Scripting
  • Windows Secure Channel
  • Windows Secure Kernel Mode
  • Windows Shell
  • Windows Standards-Based Storage Management Service
  • Windows Storage
  • Windows Storage Port Driver
  • Windows Telephony Server
  • Winlogon

Here’s a closer look at the most interesting Microsoft CVEs:

CVE-2024-43572

CVE-2024-43572 is a Remote Code Execution vulnerability in Microsoft Management Console, which is a tool providing users and administrators the ability to configure and manage systems. It has a CVSS score of 7.8, and it’s rated Important.

A successful exploit of this vulnerability could allow an attacker to execute arbitrary code on the targeted asset. The attacker could then use social engineering tactics to trick a user into uploading and opening a specially crafted file. Microsoft’s update will prevent unsigned MSC files from being used.

Microsoft has evidence that CVE-2024-43572 was exploited in the wild as a zero-day, which prompted CISA to add it to the Known Exploited Vulnerabilities list – with an urgent fix date.

CVE-2024-43573

CVE-2024-43573 is a Spoofing vulnerability in Windows MSHTML Platform, a browser engine that renders web pages. It is used in Internet Explorer mode in Microsoft Edge and other applications through WebBrowser control. Even though Internet Explorer is EOL/EOS, MSHTML is still widely used, and therefore, Microsoft is still patching vulnerabilities.

Although Microsoft has not shared any details about the exploitation techniques, successful exploitation of a spoofing vulnerability cloud allows attackers to access the target system by disguising themselves as trusted sources.

Microsoft has confirmed that this vulnerability has also been successfully exploited in the wild, and CISA added it to their KEV list.

It’s important to note that the Windows MSHTML Platform has been the center of attention of the security community since this is the fourth zero-day vulnerability in this framework that was exploited in the wild in 2024. This makes it very important for organizations to consider their strategy and potentially prioritize the upgrade to newer, less problematic frameworks.

CVE-2024-43468

CVE-2024-43468 is a Remote Code Execution vulnerability in Microsoft Configuration Manager, part of the Microsoft Intune family, the systems management software empowering administrators to manage large groups of assets. Not to be confused with MMC. It has a CVSS score of 9.8 and is rated Critical.

A successful exploitation of this vulnerability allows an unauthenticated attacker to send specially crafted requests, resulting in executing commands on the targeted server / underlying database.

It’s important to note that to protect against this vulnerability, in addition to patching the system, you need to install an update through the product console, following their detailed Guide.

CVE-2024-43488

CVE-2024-43488 is a Remote Code Execution vulnerability in Visual Studio Code, which is VS Code’s Arduino extension – an open-source platform to code, build, and deploy projects for microcontrollers. It was assigned Critical severity and is related to a missing authentication control that could potentially allow attackers to execute remote code.

Microsoft is not planning to fix this vulnerability in the Visual Studio Code extension for Arduino, as the extension has been deprecated. Customers are advised to use the Arduino IDE software.

CVE-2024-43582

CVE-2024-43582 is a Critical Remote Code Execution vulnerability in the well-known RDP—Remote Desktop Protocol, a secure network communication protocol offered by Microsoft that allows users to execute remote operations on remote computers.

To successfully exploit this vulnerability, the attacker must craft and send malicious packets to an RPC host. This could potentially result in remote code execution on the server side with the same permissions as the RPC service.

Considering that the security best practice is to block RDP from the Internet, this should limit the exposure of most organizations to internal assets only. However, RDP is still widely used for administrative tasks. Even under these conditions, attackers could leverage this vulnerability for lateral movement within the enterprise.

CVE-2024-43583

CVE-2024-43583 is an Elevation of Privilege vulnerability in Winlogon, which is Windows’ authentication utility, one of the most important security elements from a user interaction perspective. In addition to authentication, Winlogon performs a wide range of critical tasks associated with the Windows sign-in process: 1) Loads the user profile into the registry, allowing users to use the different keys for each user account. 2) Monitors user keyboard and mouse activity, triggers screen saver on inactivity and locks the PC.

This vulnerability has been publicly disclosed, but there’s no evidence that it was exploited. It has a CVSS of 7.8, is rated Important and could potentially allow an attacker to get System-level access. It’s important to note that, in addition to installing the patch, Microsoft also recommends users enable a Microsoft first-party Input Method Editor (IME) to prevent potential attackers from being able to exploit third-party IMEs during the sign-in process.

CVE-2024-20659

CVE-2024-20659 is a Security Feature Bypass vulnerability in Windows Hyper-V, which is Microsoft’s hardware virtualization engine, widely used especially by Enterprise organizations. It has a CVSS of 7.1, has been classified as Important and was publicly disclosed, with no evidence of being exploited.

It was marked as “less likely to be exploited,” mainly because the set of conditions that need to be met for exploitation to be successful suggests in-person user-required actions.

Successful exploitation allows the attacker to bypass the UEFI of the host asset, resulting in the compromise of both the hypervisor itself and the secure kernel, including the guests.

Complete list of Microsoft CVEs released this month:

CVE Severity Type CVSS Exploitation
CVE-2024-20659 Important Security Feature Bypass 7.1 KNOWN EXPLOIT
CVE-2024-30092 Important Remote Code Execution 8 Less Likely
CVE-2024-37976 Important Security Feature Bypass 6.7 Less Likely
CVE-2024-37979 Important Elevation of Privilege 6.7 Less Likely
CVE-2024-37982 Important Security Feature Bypass 6.7 Less Likely
CVE-2024-37983 Important Security Feature Bypass 6.7 Less Likely
CVE-2024-38029 Important Remote Code Execution 7.5 Less Likely
CVE-2024-38097 Important Elevation of Privilege 7.1 Unlikely
CVE-2024-38124 Important Elevation of Privilege 9 Less Likely
CVE-2024-38129 Important Elevation of Privilege 7.5 Less Likely
CVE-2024-38149 Important Denial of Service 7.5 Less Likely
CVE-2024-38179 Important Elevation of Privilege 8.8 Less Likely
CVE-2024-38212 Important Remote Code Execution 8.8 Less Likely
CVE-2024-38229 Important Remote Code Execution 8.1 Less Likely
CVE-2024-38261 Important Remote Code Execution 7.8 Less Likely
CVE-2024-38262 Important Remote Code Execution 7.5 Less Likely
CVE-2024-38265 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43453 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43456 Important Data Tampering 4.8 Less Likely
CVE-2024-43468 Critical Remote Code Execution 9.8 Less Likely
CVE-2024-43480 Important Remote Code Execution 6.6 Less Likely
CVE-2024-43481 Important Spoofing 6.5 Less Likely
CVE-2024-43483 Important Denial of Service 7.5 Less Likely
CVE-2024-43484 Important Denial of Service 7.5 Less Likely
CVE-2024-43485 Important Denial of Service 7.5 Less Likely
CVE-2024-43488 Critical Remote Code Execution 8.8 Less Likely
CVE-2024-43497 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43500 Important Information Disclosure 5.5 Less Likely
CVE-2024-43501 Important Elevation of Privilege 7.8 Less Likely
CVE-2024-43502 Important Elevation of Privilege 7.1 More Likely
CVE-2024-43503 Important Elevation of Privilege 7.8 Less Likely
CVE-2024-43504 Important Remote Code Execution 7.8 Less Likely
CVE-2024-43505 Important Remote Code Execution 7.8 Less Likely
CVE-2024-43506 Important Denial of Service 7.5 Less Likely
CVE-2024-43508 Important Information Disclosure 5.5 Less Likely
CVE-2024-43509 Important Elevation of Privilege 7.8 More Likely
CVE-2024-43511 Important Elevation of Privilege 7 Less Likely
CVE-2024-43512 Important Denial of Service 6.5 Less Likely
CVE-2024-43513 Important Security Feature Bypass 6.4 Less Likely
CVE-2024-43514 Important Elevation of Privilege 7.8 Less Likely
CVE-2024-43515 Important Denial of Service 7.5 Less Likely
CVE-2024-43516 Important Elevation of Privilege 7.8 Less Likely
CVE-2024-43517 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43518 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43519 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43520 Important Denial of Service 5 Less Likely
CVE-2024-43521 Important Denial of Service 7.5 Less Likely
CVE-2024-43522 Important Elevation of Privilege 7 Less Likely
CVE-2024-43523 Important Remote Code Execution 6.8 Less Likely
CVE-2024-43524 Important Remote Code Execution 6.8 Less Likely
CVE-2024-43525 Important Remote Code Execution 6.8 Less Likely
CVE-2024-43526 Important Remote Code Execution 6.8 Less Likely
CVE-2024-43527 Important Elevation of Privilege 7.8 Less Likely
CVE-2024-43528 Important Elevation of Privilege 7.8 Less Likely
CVE-2024-43529 Important Elevation of Privilege 7.3 Less Likely
CVE-2024-43532 Important Elevation of Privilege 8.8 Less Likely
CVE-2024-43533 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43534 Important Information Disclosure 6.5 Less Likely
CVE-2024-43535 Important Elevation of Privilege 7 Less Likely
CVE-2024-43536 Important Remote Code Execution 6.8 Less Likely
CVE-2024-43537 Important Denial of Service 6.5 Less Likely
CVE-2024-43538 Important Denial of Service 6.5 Less Likely
CVE-2024-43540 Important Denial of Service 6.5 Less Likely
CVE-2024-43541 Important Denial of Service 7.5 Less Likely
CVE-2024-43542 Important Denial of Service 6.5 Less Likely
CVE-2024-43543 Important Remote Code Execution 6.8 Less Likely
CVE-2024-43544 Important Denial of Service 7.5 Less Likely
CVE-2024-43545 Important Denial of Service 7.5 Less Likely
CVE-2024-43546 Important Information Disclosure 5.6 Less Likely
CVE-2024-43547 Important Information Disclosure 6.5 Less Likely
CVE-2024-43549 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43550 Important Spoofing 7.4 Less Likely
CVE-2024-43551 Important Elevation of Privilege 7.8 Less Likely
CVE-2024-43552 Important Remote Code Execution 7.3 Less Likely
CVE-2024-43553 Important Elevation of Privilege 7.4 Less Likely
CVE-2024-43554 Important Information Disclosure 5.5 Less Likely
CVE-2024-43555 Important Denial of Service 6.5 Less Likely
CVE-2024-43556 Important Elevation of Privilege 7.8 More Likely
CVE-2024-43557 Important Denial of Service 6.5 Less Likely
CVE-2024-43558 Important Denial of Service 6.5 Less Likely
CVE-2024-43559 Important Denial of Service 6.5 Less Likely
CVE-2024-43560 Important Elevation of Privilege 7.8 More Likely
CVE-2024-43561 Important Denial of Service 6.5 Less Likely
CVE-2024-43562 Important Denial of Service 7.5 Less Likely
CVE-2024-43563 Important Elevation of Privilege 7.8 Less Likely
CVE-2024-43564 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43565 Important Denial of Service 7.5 Less Likely
CVE-2024-43567 Important Denial of Service 7.5 Less Likely
CVE-2024-43570 Important Elevation of Privilege 6.4 Less Likely
CVE-2024-43571 Important Spoofing 5.6 Less Likely
CVE-2024-43572 Important Remote Code Execution 7.8 KNOWN EXPLOIT
CVE-2024-43573 Moderate Spoofing 6.5 KNOWN EXPLOIT
CVE-2024-43574 Important Remote Code Execution 8.3 Less Likely
CVE-2024-43575 Important Denial of Service 7.5 Less Likely
CVE-2024-43576 Important Remote Code Execution 7.8 Less Likely
CVE-2024-43581 Important Remote Code Execution 7.1 More Likely
CVE-2024-43582 Critical Remote Code Execution 8.1 Less Likely
CVE-2024-43583 Important Elevation of Privilege 7.8 KNOWN EXPLOIT
CVE-2024-43584 Important Security Feature Bypass 7.7 Less Likely
CVE-2024-43585 Important Security Feature Bypass 5.5 Less Likely
CVE-2024-43589 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43590 Important Elevation of Privilege 7.8 Less Likely
CVE-2024-43591 Important Elevation of Privilege 8.7 Less Likely
CVE-2024-43592 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43593 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43599 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43601 Important Remote Code Execution 7.1 Less Likely
CVE-2024-43603 Important Denial of Service 5.5 Less Likely
CVE-2024-43604 Important Elevation of Privilege 5.7 Less Likely
CVE-2024-43607 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43608 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43609 Important Spoofing 6.5 More Likely
CVE-2024-43611 Important Remote Code Execution 8.8 Less Likely
CVE-2024-43612 Important Spoofing 7.6 Less Likely
CVE-2024-43614 Important Spoofing 5.5 Less Likely
CVE-2024-43615 Important Remote Code Execution 7.1 More Likely
CVE-2024-43616 Important Remote Code Execution 7.8 Less Likely
CVE-2024-6197 Remote Code Execution 7.5 KNOWN EXPLOIT
CVE-2024-7025 Remote Code Execution 9.8
CVE-2024-9369 Remote Code Execution 9.8
CVE-2024-9370 Remote Code Execution 9.8

Important updates from other Vendors this Month:

ADOBE has released patches covering a wide range of products and vulnerabilities. The most important are CVE-2024-41869 (CVSS 7.8) and CVE-2024-45112 (CVSS 8.6)—two critical memory corruption flaws in Acrobat and PDF Reader that could lead to arbitrary code execution on compromised systems.

GITLAB has also made important updates, especially CVE-2024-6678, a CVSS 9.9 vulnerability that allows attackers to execute pipeline actions as regular users. CVE-2024-6678 is also important as it allows attackers to shut down environments remotely, without user interaction, without needing to elevate privilege. The list of fixed vulnerabilities is quite long, including CVE-2024-8640, CVE-2024-8635, CVE-2024-8124, and CVE-2024-8641, all high-severity vulnerabilities with potential impacts ranging from service disruption to unauthorized command execution and data compromise.

CISCO has released patches for 11 vulnerabilities for IOS and IOS XE products, with issues ranging from DoS to RCE. Particularly interesting is CVE-2024-20350, which could allow a remote attacker to intercept traffic between SSH clients and the Catalyst Center SSH server. CVE-2024-20381 in the Network Services Orchestrator could allow a remote authenticated attacker to send malicious requests, create a new account, or escalate privileges.

Balbix Recommendations:

As always, you should patch everything as soon as possible… 😉 

But that’s a lot easier said than done. The strategy is prioritizing what matters most and reducing the vulnerabilities with the greatest business impact. For this, organizations must improve how they measure, quantify, prioritize, and communicate risk. Balbix offers the following AI-powered capabilities:

#1 – CAASM > Understand your attack surface. An accurate & up-to-date inventory of on-premises, cloud, IoT/OT assets and software bill of materials (SBOM) is fundamental. Additionally, organizations need to understand:

  • What are the material assets?
  • Where are they located?
  • What data/business context is associated with them?
  • Do they have any existing security controls enabled?

#2 – RVBM > Prioritize and remediate critical vulnerabilities. Use severity, threat intelligence, asset exposure, compensating controls and business context to understand which vulnerabilities are exploited and the financial impact of it (if exploited) to your organization. Use this data to prioritize ruthlessly.

#3 – CRQ > Quantify Cyber Risk. Using a language that is easily understandable by all, i.e., monetary or currencies. It’s the only way to effectively communicate and compare risk across all different environments, software, geos, business units, etc.

But the true magic of Balbix happens when you put all these together:

The Balbix Platform started doing its homework as soon as vendors announced CVEs. No human interaction is needed. It’s all driven by AI. It learned about the new CVEs and the Cyber Threat Intelligence associated with each of them, and it correlated with each asset’s technical and business context to calculate the Balbix scores.

This way, Risk-Based Prioritization is already done, and Balbix customers can simply start a Patch Prioritization workflow and automatically get the latest KB that needs to be installed on a set of assets / OS.

Patch-Prioritization-Project

Patch-Tuesday-August-CVEs-Dashboard

This way, Balbix customers have a clear understanding of the assets in scope, unique CVE detections, unique patches to be applied, etc., and most importantly, the priority in which patches need to be installed to burn down risk in the most efficient way possible.

If you want to learn more, please sign up for a Balbix demo.