For January 2024 Patch Tuesday, Microsoft has released fixes for 49 CVE-numbered vulnerabilities, two of which are critical: CVE-2024-20674 and CVE-2024-20700.
None of the vulnerabilities fixed this time aroundare under active exploitation or have been previously publicly disclosed.
CVE-2024-20674 is a security feature bypass vulnerability that may allow attackers to impersonate Windows' Kerberos server.
Though an attacker must first gain access to the restricted network before running an attack, Microsoft thinks that the likelihood of attackers exploiting this flaw is considerable and the complexity of attack is low, and has therefore urged admins to prioritize testing and deploying this patch.
CVE-2024-20700 is a remote code execution flaw in Windows' Hyper-V native hypervisor.
Once again, an attacker first needs to gain access to the restricted network before deploying an exploit for this flaw.
Satnam Narang, senior staff research engineer at Tenable, singled out CVE-2024-21318, a remote code execution vulnerability in Microsoft SharePoint Server.
Other vulnerabilities deemed more likely to be exploited are several elevation of privilege vulnerabilities in Windows Clouds Files Mini Filter Driver, Common Log File System, Windows Kernel and Win32k, Narang also pointed out.
Finally, Microsoft has fixed CVE-2024-20677, a vulnerability in Microsoft Office that could lead to remote code execution via FBX files.
The company fixed this flaw by disabling the ability to insert FBX files in Word, Excel, PowerPoint and Outlook for Windows and Mac.
This Cyber News was published on www.helpnetsecurity.com. Publication date: Tue, 09 Jan 2024 20:43:15 +0000