Cookie Consent by Free Privacy Policy Generator Microsoft's January 2024 Patch Tuesday Addresses 48 Security Flaws, Including Critical Windows Vulnerabilities | Review Space



Cover Image

Microsoft's January 2024 Patch Tuesday Addresses 48 Security Flaws, Including Critical Windows Vulnerabilities

A detailed overview of the latest Patch Tuesday updates and the critical security vulnerabilities addressed by Microsoft

NEWS  Security  January 10, 2024  Reading time: 2 Minute(s)

mdo Max (RS editor)


Microsoft has rolled out its Patch Tuesday updates for January 2024, addressing a total of 48 security flaws across its software ecosystem. This comprehensive security update includes fixes for two critical and 46 important vulnerabilities, showcasing the company's commitment to maintaining the security of its products.

No Zero-Day Exploits

Remarkably, this marks the second consecutive Patch Tuesday with no zero-day exploits, underscoring Microsoft's proactive approach in addressing potential threats before they become actively exploited in the wild.

Chromium-based Edge Browser Security

In addition to the software fixes, Microsoft has resolved nine security vulnerabilities in the Chromium-based Edge browser since the December 2023 Patch Tuesday updates. Notably, this includes addressing a zero-day vulnerability (CVE-2023-7024) actively exploited in the wild, emphasizing the importance of keeping browsers secure.

Critical Vulnerabilities

Among the critical vulnerabilities addressed this month, two stand out:

  1. CVE-2024-20674 (CVSS score: 9.0) - Windows Kerberos Security Feature Bypass Vulnerability: Microsoft warns of a potential security feature bypass in the Windows Kerberos authentication system. Successful exploitation could lead to impersonation, requiring an attacker to gain access to the restricted network first.
  2. CVE-2024-20700 (CVSS score: 7.5) - Windows Hyper-V Remote Code Execution Vulnerability: This vulnerability poses a remote code execution risk without the need for authentication or user interaction. The exact location of the attacker and the context of the attack remain unclear, adding complexity to its potential exploitation.

Notable Flaws

Other noteworthy vulnerabilities include:

  • CVE-2024-20653 (CVSS score: 7.8) - Privilege Escalation in Common Log File System (CLFS) driver
  • CVE-2024-0056 (CVSS score: 8.7) - Security Bypass affecting System.Data.SqlClient and Microsoft.Data.SqlClient

These flaws highlight the diverse range of vulnerabilities addressed, from privilege escalation to security bypasses, underlining the importance of a comprehensive security update.

Mitigation Measures

Microsoft has taken proactive measures, disabling the ability to insert FBX files in Word, Excel, PowerPoint, and Outlook in Windows by default. This action is in response to a security flaw (CVE-2024-20677) that could lead to remote code execution. Microsoft recommends using GLB (Binary GL Transmission Format) as a substitute 3D file format for enhanced security.

Microsoft's January 2024 Patch Tuesday updates reflect a robust response to emerging security threats, addressing a wide range of vulnerabilities. Users are strongly advised to apply these updates promptly to enhance the security posture of their systems. 

 COVER IMAGE BY RAWPIXEL.COM ON FREEPIK / REVIEW SPACE | WINDOWS LOGO: MICROSOFT 

SHARE THIS ARTICLE



 COMMENTS


Currently there are no comments, so be the first!

*Our pages may contain affiliate links. If you buy something via one of our affiliate links, Review Space may earn a commission. Thanks for your support!
spacer

SPONSORED



SPONSORED


CATEGORIES



banner

Buy Me a Coffee at ko-fi.com