October 2024 Patch Tuesday Update – Spiceworks

Published:

October 2024 Patch Tuesday: A Comprehensive Overview of Microsoft’s Security Updates

On the second Tuesday of each month, Microsoft takes a proactive stance in cybersecurity by releasing a suite of security updates for its products. This October, the tech giant addressed a staggering 117 Microsoft Common Vulnerabilities and Exposures (CVEs) and republished four non-Microsoft CVEs, marking a significant increase from the previous month’s update, which identified 79 vulnerabilities. Among these, five zero-day vulnerabilities were addressed, including two that were actively being exploited, underscoring the critical nature of this month’s patch cycle.

A Closer Look at the Vulnerabilities

The October Patch Tuesday release is notable not only for its size but also for the nature of the vulnerabilities it addresses. A striking 36% of the issues this month are classified as remote code execution vulnerabilities, while elevation of privilege (24%) and denial of service (22%) vulnerabilities make up nearly half of the remaining issues. This distribution highlights the ongoing threat landscape and the importance of timely updates to safeguard systems.

October 2024 Patch Tuesday Zero-Day Vulnerabilities

Actively Exploited Vulnerabilities

  1. CVE-2024-43572
    This remote code execution vulnerability exists within the Microsoft Management Console and is caused by improper neutralization of malformed messages. With a CVSS score of 7.8, it ranks high in severity, making it a critical target for attackers.

  2. CVE-2024-43573
    A spoofing vulnerability in the Windows MSHTML Platform allows for cross-site scripting. Although it has a medium severity rating with a CVSS score of 6.5, Microsoft emphasizes the need for users to address this vulnerability due to its potential impact on applications that utilize the MSHTML Platform, including Internet Explorer mode in Microsoft Edge.

Publicly Disclosed Vulnerabilities

  1. CVE-2024-6197
    This high-severity remote code execution vulnerability affects the open-source cUrl command-line tool. When a client connects to a malicious server, an attacker could execute arbitrary code on the client, earning it a CVSS score of 8.8.

  2. CVE-2024-20659
    This security bypass vulnerability in Windows Hyper-V could allow an attacker to compromise the hypervisor and secure kernel under specific conditions. It has a CVSS score of 7.1, but successful exploitation requires multiple prerequisites, including access to a restricted network.

  3. CVE-2024-43583
    An escalation of privilege vulnerability in Winlogon could enable an attacker to gain system access. Microsoft recommends enabling a first-party Input Method Editor (IME) to mitigate potential issues during login.

Critical Vulnerabilities in October 2024 Patch Tuesday

This month’s update is particularly noteworthy for containing only three critical vulnerabilities, a rarity since the April update.

Microsoft Configuration Manager

  • CVE-2024-43468
    An unauthenticated attacker could exploit this SQL injection vulnerability to execute unauthorized commands on the server or database. Users of Configuration Manager versions 2303, 2309, and 2403 are urged to install an in-console update to protect against this exploit.

Visual Studio Code

  • CVE-2024-43488
    This vulnerability arises from missing authentication in the Visual Studio Code extension for Arduino, allowing an unauthenticated attacker to execute code via a network attack vector. Microsoft has mitigated this risk by deprecating the Arduino extension.

Remote Desktop Protocol Server

  • CVE-2024-43582
    An unauthenticated attacker could send malformed packets to a remote procedure call (RPC) host, enabling them to execute code on the server with the same permissions as the RPC service.

Breakdown of Vulnerabilities

The categorization of vulnerabilities for October 2024 is as follows:

  • 42 Remote Code Execution (RCE)
  • 28 Elevation of Privileges (EoP)
  • 26 Denial of Service (DoS)
  • 7 Spoofing
  • 7 Security Feature Bypass (SFB)
  • 6 Information Disclosure
  • 1 Tampering

This breakdown illustrates the diverse range of vulnerabilities that organizations must contend with, emphasizing the need for robust security practices.

Conclusion

Microsoft’s Security Response Center has provided a complete list of vulnerabilities, including CVE numbers, base CVSS scores, and potential exploitability. As cyber threats continue to evolve, the importance of timely updates cannot be overstated. Organizations are encouraged to prioritize these updates to protect their systems and data from potential exploits. The October 2024 Patch Tuesday serves as a reminder of the ongoing battle against cyber threats and the critical role that regular security updates play in maintaining a secure digital environment.

For more detailed information, users can refer to the Microsoft Security Response Center for a comprehensive overview of the vulnerabilities addressed this month.

Related articles

Recent articles