Microsoft Patch Tuesday – September 10th 2024

“Patch Tuesday” is an unofficial term used to refer to the second Tuesday of each month, when Microsoft, Adobe, Oracle, Google and other vendors regularly release software patches for their software products. Critical security updates are occasionally released outside of the normal Patch Tuesday cycle, but these are known as “Out-of-band” releases. Security updates for September 10th 2024 include 4 critical flaws under active exploitation among a total of 79 vulnerabilities this month.

Four Critical Flaws Under Active Exploitation Are Among 79 Key Vulnerabilities Highlighted in Microsoft Products This Month

 

“Patch Tuesday” is an unofficial term used to refer to the second Tuesday of each month, when Microsoft, Adobe, Oracle, Google and other vendors regularly release software patches for their software products. Critical security updates are occasionally released outside of the normal Patch Tuesday cycle, but these are known as “Out-of-band” releases.

You can access the Microsoft list of Security Updates for September 2024 directly at msrc.microsoft.com/update-guide/releaseNote/2024-Sep

 

Commentary

The top story this month without a question is CVE-2024-43491, a ‘Pandora’s Box’ that has rolled back previous fixes for a number of critical vulnerabilities affecting Optional Components on Windows 10. Due to a major flaw in the implementation of a controversial ‘Rollback’ feature of the Windows Servicing Stack, multiple previously-patched vulnerabilities were inadvertently rolled back to a vulnerable state and will have remained in a vulnerable state since March 2024. What’s worse is that several of the vulnerabilities that had their patches rolled back were already known to be undergoing active exploit in the wild. And in an extra sting in the tail causing headaches for system administrators, Windows update would erroneously report that it is fully patched, leaving IT managers unaware of the risk. Oof.

Microsoft Patch Tuesday, September 2024 update also includes important updates for vulnerabilities in Microsoft Office and Components, Windows Hyper-V, Windows DHCP Server, Microsoft Streaming Service, Microsoft Management Console, Windows MSHTML Platform, Microsoft Dynamics 365 (on-premises), and more.

 

Known Exploited (a.k.a 0-Day) Vulnerabilities

The list of “Known Exploited” vulnerabilities below have been reported by the CISA, America’s Cyber Defense Agency, to be known to be currently being exploited in the wild and at scale. These represent the absolute highest priority for patching for many organisations.

The AppCheck Scanner is able to detect these vulnerabilities and report on their presence in your technical estate, enabling you to effectively and swiftly target them for remediation – please click each CVE below to read more about each entry on our public-facing Detections database.

 

Active Exploitation of Windows Installer Elevation of Privilege Vulnerability (CVE-2024-38014)

Attackers are exploiting this vulnerability to enable an escalation of privilege and gain SYSTEM (superuser) privileges, allowing them to execute arbitrary commands from a privileged context.

See more details in the AppCheck Detections Service at https://detections.appcheck-ng.com/vulnerabilities/view/320659

 

Active Exploitation of Windows MoTW Bypass Vulnerability (CVE-2024-38217)

Attackers are reported to be exploiting a flaw in the Windows Mark of the Web (MOTW) protection mechanism to deploy malware and ransomware on vulnerable systems.

See more details in the AppCheck Detections Service at https://detections.appcheck-ng.com/vulnerabilities/view/320661

 

Active Exploitation of Publisher Security Feature Bypass Vulnerability (CVE-2024-38226)

Attackers have found a way to bypass Office macro policies used to block the execution of malicious code contained in untrusted files, and are exploiting it via social engineering attacks to execute arbitrary (attacker-controlled) macro code on victims’ machines.

See more details in the AppCheck Detections Service at https://detections.appcheck-ng.com/vulnerabilities/view/320663

 

Active Exploitation of RCE Vulnerability in Windows Update (CVE-2024-43491)

A serious flaw in Microsoft’s Servicing Stack means that patches already applied by system administrators against critical vulnerabilities may have been rolled back. As a result, previously-secure systems have been laid open to exploitation multiple critical, previously-patched vulnerabilities.

See more details in the AppCheck Detections Service at https://detections.appcheck-ng.com/vulnerabilities/view/320701

 

Critical (CVSS 9+) Patches to Prioritise

The list of “Critical” vulnerabilities below are all those with a “CVSS” score of 9.0 or greater. This generally reflects a vulnerability that is a critical risk, being both trivial to exploit, likely to be exploited, and which could cause great harm and damage if exploited:

Product CVE CVSS Score
Azure Stack Hub Elevation of Privilege CVE-2024-38220 9.0
Microsoft Windows Update Remote Code Execution Vulnerability CVE-2024-43491 9.8

 

 

‘Highly Exploitable’ Vulnerabilities

The list of “Highly Exploitable” vulnerabilities below are all those which Microsoft has determined are relatively trivial to exploit.

Product CVE CVSS Score
Microsoft Office SharePoint6.5 CVE-2024-38018 8.8
Microsoft Office SharePoint CVE-2024-38227 7.2
Microsoft Office SharePoint CVE-2024-38228 7.2
Microsoft Streaming Service CVE-2024-38237 7.8
Microsoft Streaming Service CVE-2024-38238 7.8
Microsoft Streaming Service CVE-2024-38241 7.8
Microsoft Streaming Service CVE-2024-38242 7.8
Microsoft Streaming Service CVE-2024-38243 7.8
Microsoft Streaming Service CVE-2024-38244 7.8
Microsoft Streaming Service CVE-2024-38245 7.8
Windows Win32K – GRFX CVE-2024-38246 7.0
Microsoft Graphics Component CVE-2024-38247 7.8
Microsoft Graphics Component CVE-2024-38249 7.8
Windows Win32K – ICOMP CVE-2024-38252 7.8
Windows Win32K – ICOMP CVE-2024-38253 7.8
Windows Setup and Deployment CVE-2024-43457 7.8
Windows MSHTML Platform CVE-2024-43461 8.8
Microsoft Office SharePoint CVE-2024-43464 7.2
Windows Mark of the Web (MOTW) CVE-2024-43487 6.5

 

 

Other Critical Patches

In addition to the above, Microsoft released 79 important security patches in total.

Products affected by this Patch Tuesday’s updates include:

  • Microsoft SQL Server
  • Microsoft Windows Remote Desktop Licensing Service
  • Microsoft Streaming Service
  • Microsoft Office SharePoint
  • Windows Network Virtualization
  • Microsoft Graphics Component
  • Microsoft Windows TCP/IP
  • Microsoft Azure Network Watcher
  • Microsoft Azure Stack
  • Microsoft Windows Mark of the Web (MOTW)

 

You can see the full list on Microsoft’s Security Update Guide page (https://msrc.microsoft.com/update-guide/en-us), along with the associated KB articles and security vulnerability details.

 

Statistics

Total Microsoft CVEs: 79

Currently exploited: 4

Highly Exploitable: 19

 

How to Protect Your Organisation with AppCheck

As with every month, if you don’t want to wait for your system to download Microsoft critical updates on pre-determined schedule, you can download them immediately from the Windows Update Catalog website at https://www.catalog.update.microsoft.com/Home.aspx and searching by Microsoft KB ID.

We also recommend scanning your entire estate using the AppCheck vulnerability scanner regularly – including end-user machines running desktop operating systems. Contact your account manager now if you are not already licensed for internal scan hubs to cover your whole estate.

 

Next Patch Tuesday

The next Patch Tuesday will be on 8th October 2024 – add it to your calendar now!

 

About AppCheck

AppCheck is a software security vendor based in the UK, offering a leading security scanning platform that automates the discovery of security flaws within organisations websites, applications, network, and cloud infrastructure. AppCheck are authorized by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA).

Get started with Appcheck

No software to download or install.

Contact us or call us 0113 887 8380

About Appcheck

AppCheck is a software security vendor based in the UK, offering a leading security scanning platform that automates the discovery of security flaws within organisations websites, applications, network and cloud infrastructure. AppCheck are authorized by te Common Vulnerabilities and Exposures (CVE) Program aas a CVE Numbering Authority (CNA)

No software to download or install.
Contact us or call us 0113 887 8380

Start your free trial

Your details
IP Addresses
URLs

Get in touch