logologo

Easy Branches allows you to share your guest post within our network in any countries of the world to reach Global customers start sharing your stories today!

Easy Branches

34/17 Moo 3 Chao fah west Road, Phuket, Thailand, Phuket

Call: 076 367 766

info@easybranches.com
Technology Cyber Security

Microsoft unleashes 157 bug fixes

Two zero-days.


  • Apr 10 2024
  • 1
  • 13455 Views
Microsoft unleashes 157 bug fixes
Microsoft unleashes 157 bug fixes

Microsoft has pushed out 157 fixes for “Patch Tuesday”, including seven Chromium bugs in the Edge browser, but critical vulnerabilities are few and far between.

Microsoft unleashes 157 bug fixes

While it only carries a CVSS score of 6.7, CVE-2024-26234 is notable because Microsoft said it has seen exploits in the wild.

Discovered by Sophos’ Christopher Budd, CVE-2024-26234 is described by Microsoft as a “proxy driver spoofing vulnerability” leading to improper access control that is only locally exploitable.

Writing about his discovery, Budd said that "the file’s metadata indicates that it is a ‘Catalog Authentication Client Service’ by “Catalog Thales” – possibly an attempt to impersonate the legitimate company Thales Group.”

Sophos said it has previously seen the malicious file as a setup file for “a product called LaiXi Screen Mirroring.

“We are confident that the file we investigated is a malicious backdoor," Budd wrote.

CVE-2024-29988 is also of interest, in spite of its CVE score of 8.8, because while Microsoft doesn’t say so, Trend’s Zero Day Initiative (ZDI) said it has also been exploited in the wild.

The bug is a SmartScreen security bypass.

“Threat actors are sending exploits in a zipped file to evade EDR/NDR detection and then using this bug (and others) to bypass MotW [Mark-of-the-Web]," ZDI said.

CVE-2024-29990 is an Azure Kubernetes service vulnerability with a CVSS score of 9.0.

It’s an elevation of privilege vulnerability in Azure Kubernetes’ confidential containers.

An unauthenticated attacker could steal credentials and “affect resources beyond the security scope managed by Azure Kubernetes Service Confidential Containers (AKSCC)," Microsoft explained.

“An attacker can access the untrusted AKS Kubernetes node and AKS Confidential Container to take over confidential guests and containers beyond the network stack it might be bound to.”

Microsoft describes three Defender for IoT vulnerabilities as “critical”, even though none of them score above 9 on the CVSS.

CVE-2024-21322 is a remote code execution (RCE) vulnerability that can only be exploited by an administrator.

CVE-2024-21323 is an RCE that’s exploited by sending a malicious update package to a Defender for IoT sensor. The attacker would first need to authenticate themselves to get the permissions needed.

CVE-2024-21323 would be exploited using a malicious tar file, which would let the attacker send unsigned update packages and “overwrite any file they choose”.

Finally, CVE-2024-29053 is a path traversal vulnerability exploitable by any authenticated user.

Related


Share this page
Guest Posts by Easy Branches