Microsoft rolled out its latest security updates on Tuesday, addressing approximately 60 vulnerabilities across various software products and called urgent attention to an actively exploited zero-day reported by multiple external threat-hunting teams.
The zero-day bug, tagged as CVE-2024-30051, is documented as a heap-based buffer overflow in the Windows Desktop Window Manager Core Library that's already been exploited in malware attacks that require elevated SYSTEM privileges.
Microsoft credited security researchers from Kaspersky, DBAPPSecurity, and Google's Threat Analysis Group for identifying and reporting the issue, suggesting it may have already been used beyond targeted attacks.
As is customary, Microsoft did not share details on the exploitation of IOCs to help defenders hunt for signs of intrusions.
Microsoft also marked CVE-2024-30040 in the already-exploited category, warning that attackers are bypassing security features in Microsoft 365 and Office.
The flaw, which carries a CVSS score of 8.8, allows attackers to execute arbitrary code if a user is tricking into loading malicious files.
The company also urged Windows admins to pay attention to CVE-2024-30044, a critical-severity remote code execution vulnerability in Microsoft Sharepoint.
This Cyber News was published on www.securityweek.com. Publication date: Tue, 14 May 2024 20:13:06 +0000