Security

Patches

Critical Windows licensing bugs – plus two others under attack – top Patch Tuesday

Citrix, SAP also deserve your attention – because miscreants are already thinking about Exploit Wednesday


Patch Tuesday Clear your Microsoft system administrator's diary: The bundle of fixes in Redmond's July Patch Tuesday is a doozy, with at least two bugs under active exploitation.

Tuesday's software updates address more than 130 Microsoft CVEs.

The first of two vulnerabilities for sure under active exploit – CVE-2024-38080 – is a Windows Hyper-V elevation of privilege flaw with a 7.8-out-of-10 CVSS rating, which Microsoft deemed "important."

We don't know how widespread exploitation is of this one, though Microsoft does note "an attacker who successfully exploited this vulnerability could gain system privileges." Plus, as Zero Day Initiative's Dustin Childs pointed out, this exploit would prove quite useful for ransomware. If you're running Hyper-V, test and deploy this update.

The second bug listed as having been found and exploited by miscreants before Redmond pushed a patch is a Windows MSHTML platform spoofing vulnerability tracked as CVE-2024-38112. MSHTML (aka Trident) is Microsoft's proprietary browser engine for Internet Explorer, and this one received a 7.5 CVSS severity score.

It does require user interaction to exploit. As Redmond explained: "An attacker would have to send the victim a malicious file that the victim would have to execute." Haifei Li with Check Point Research discovered and reported the flaw to Microsoft.

The outcome of its exploitation is vague, though it appears it causes something like information or resources to be exposed to the wrong person. Given the prevalence of successful social engineering attacks of late – and the fact that Microsoft has already detected exploitation of this CVE – we've seen time and again that getting users to click malicious links is pretty darn easy. Thus, patch this before your next bad click triggers CVE-2024-38112.

The first of two CVE bugs listed as publicly disclosed but not publicly exploited is CVE-2024-35264 – a remote code execution vulnerability in .NET and Visual Studio. To exploit this one, an attacker would need to induce a race condition to allow inappropriate data access. But they could use it to achieve remote code execution (RCE).

According to Redmond: "An attacker could exploit this by closing an http/3 stream while the request body is being processed leading to a race condition." Microsoft's own Radek Zikmund found this flaw.

The second known but not exploited bug – CVE-2024-37985 – affects Arm-based Redmond operating systems and it garnered a 5.9 CVSS rating. It's a side-channel attack from 2023 dubbed FetchBench that can be abused to leak secret information.

Five critical Microsoft CVEs

Of the remaining Microsoft CVEs, five are critical severity and three of those – CVE-2024-38074, CVE-2024-38076 and CVE-2024-38077 – are 9.8-rated RCE bugs in Windows Remote Desktop Licensing Service. Redmond described all three as "exploitation less likely."

Zero Day Initiative's Childs's advice regarding CVE-2024-38077 is that "exploitation of this should be straightforward, as any unauthenticated user could execute their code simply by sending a malicious message to an affected server."

He recommended making sure these servers aren't accessible over the internet. "If a bunch of these servers are internet-connected, I would expect exploitation soon," Childs warned. "Now is also a good time to audit your servers to ensure they aren't running any unnecessary services."

The other two critical Microsoft bugs include CVE-2024-38060 – an 8.8-rated RCE in Windows Imaging Component that could be exploited by any authenticated user uploading a malicious TIFF file to a server.

Also of note is CVE-2024-38023 – a 7.2-rated flaw in Microsoft SharePoint Server that can also lead to RCE. "An authenticated attacker with Site Owner permissions can use the vulnerability to inject arbitrary code and execute this code in the context of SharePoint Server," Redmond explained.

Adobe lightens up

Adobe’s monthly patch dump addresses a mere three products and seven CVEs – none of which appear to have been found and exploited by criminals.

That's the good news. The bad news is that six of the seven are critical bugs can lead to arbitrary code execution.

Today's updates address one critical vulnerability – CVE-2024-34123 – in Adobe Premiere Pro, and four other critical flaws – CVE-2024-20781, CVE-2024-20782, CVE-2024-20783, CVE-2024-20785 – in InDesign. The patches for Adobe Bridge fix two vulnerabilities – one of which (CVE-2024-34139) is rated critical and the other (CVE-2024-34140) important as it can allow memory leakage.

SAP security notes

SAP released 18 new and updated patches, two of which are high-priority fixes.

Security note #3483344 is the most critical of the bunch. It's a missing authorization check vulnerability in SAP Product Design Cost Estimating (PDCE) that earned a 7.7 CVSS score.

"A remote-enabled function module in SAP PDCE allows a remote attacker to read generic table data and thus poses the system's confidentiality at high risk," Onapsis Research Labs SAP security researcher Thomas Fritsch warned. "The patch disables the vulnerable function module."

Fortinet fixes flaws

Fortinet fixed a cross-site scripting vulnerability tracked as CVE-2024-26006 in FortiOS and FortiProxy's web SSL VPN UI. It "may allow a remote unauthenticated attacker to perform a Cross-Site Scripting attack via social engineering the targeted user into bookmarking a malicious samba server, then opening the bookmark," the vendor warned.

The infosec outfit also patched CVE-2024-26015 in the FortiOS and FortiProxy IP address validation feature. It's a bug that could be abused by an unauthenticated attacker to bypass the IP blocklist using specially crafted requests.

Citrix joins the party

Citrix addressed a CVE-2024-6151 and CVE-2024-6286 – both 8.5-rated privilege-escalation flaws in Windows Virtual Delivery Agent and the Citrix Workspace app – that could allow a low-privileged user to gain system privileges.

Citrix Workspace app is the client for virtual desktops and apps and is deployed on many not-very-strictly managed endpoints, making this a bug worthy of your attention.

And…Android

Rounding out the July patch party, Google released patches for 27 CVEs in Android. The worst of the bunch is CVE-2024-31320 – a critical security vulnerability in the Framework component that could lead to local escalation of privilege with no additional execution privileges needed. ®

Send us news
19 Comments

Under Trump 2.0, Europe's dependence on US clouds back under the spotlight

Technologist Bert Hubert tells The Reg Microsoft Outlook is a huge source of geopolitical risk

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

Said bugs 'can have significant implications' – glad to hear that from Redmond

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Oops, some of our customers' Power Pages-hosted sites were exploited, says Microsoft

Don't think this is SaaS and you can relax: Redmond wants a few of you to check your websites

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

If you dread a Microsoft Teams invite, just wait until it turns out to be a Russian phish

Roses aren't cheap, violets are dear, now all your access token are belong to Vladimir

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

February's Patch Tuesday sees Microsoft offer just 63 fixes

Don't relax just yet: Redmond has made some certificate-handling changes that could trip unprepared admins

Microsoft shows off novel quantum chip that can scale to 'a million qubits'. So far: Eight

Not just a matter of time but a matter of Majorana fermions, too

Microsoft's drawback on datacenter investment may signal AI demand concerns

Investment bank claims software giant ditched 'at least' 5 land parcels due to potential 'oversupply'

Ad-supported Microsoft Office bobs to the surface

Only a test at the moment, but a sign of things to come?

Microsoft trims more CPUs from Windows 11 compatibility list

OEMs blowing dust from the processor stock cupboard, beware