Skip to content

Microsoft Patches 139 Security Holes, Including Actively Exploited Bugs

Microsoft's latest updates address a significant number of security issues, including two critical bugs actively exploited in the wild. With the end of support for SQL Server 2014, users are urged to update their systems.

Here there are buildings with the windows, this is clock and a sky.
Here there are buildings with the windows, this is clock and a sky.

Microsoft Patches 139 Security Holes, Including Actively Exploited Bugs

Microsoft has addressed a significant number of security issues with its latest updates. The patches include fixes for critical vulnerabilities in Microsoft Office 365 and Windows, with some actively exploited in the wild.

Among the 139 security holes plugged, two stand out for their severity and active exploitation. CVE-2024-38080, a bug in Windows Hyper-V, allows attackers to escalate their privileges on a Windows machine. Meanwhile, CVE-2024-38112, a weakness in MSHTML, affects Windows Server 2008 R2 and later versions.

The security firm Trellix reported a zero-day vulnerability, CVE-2024-38021, in Microsoft Office 365. This remote code execution flaw can lead to NTLM hash disclosure. While Microsoft rated its severity as 'Important', Morphisec disputes this, arguing it should be rated 'Critical'.

Three vulnerabilities in Windows Remote Desktop Service (CVE-2024-38077, CVE-2024-38074, and CVE-2024-38076) have been identified. Additionally, a local network vulnerability in Windows Layer Two Bridge Network, CVE-2024-38053, should be prioritized for road warriors to patch.

Today also marks the End of Support date for SQL Server 2014, with over 110,000 instances still publicly available. Users are urged to update their systems to avoid potential security risks. Microsoft's prompt action in addressing these vulnerabilities demonstrates its commitment to user security.

Read also:

Latest