Original Article Text

Click to Toggle View

Microsoft August 2024 Patch Tuesday fixes 9 zero-days, 6 exploited. Today is Microsoft's August 2024 Patch Tuesday, which includes security updates for 89 flaws, including six actively exploited and three publicly disclosed zero-days. Microsoft is still working on an update for a tenth publicly disclosed zero-day. This Patch Tuesday fixed eight critical vulnerabilities, which were a mixture of elevation of privileges, remote code execution, and information disclosure. The number of bugs in each vulnerability category is listed below: The number of bugs listed above do not include Microsoft Edge flaws that were disclosed earlier this month. To learn more about the non-security updates released today, you can review our dedicated articles on the new Windows 11 KB5041585 update  and Windows 10 KB5041580 update. Tend zero-days disclosed This month's Patch Tuesday fixes six actively exploited and three other publicly disclosed zero-day vulnerabilities. Another publicly disclosed zero-day remains unfixed at this time, but Microsoft is working on an update. Microsoft classifies a zero-day flaw as one that is publicly disclosed or actively exploited while no official fix is available. The six actively exploited zero-day vulnerabilities in today's updates are: CVE-2024-38178 - Scripting Engine Memory Corruption Vulnerability Microsoft says that the attack requires an authenticated client to click a link in order for an unauthenticated attacker to initiate remote code execution. The link must be clicked in Microsoft Edge in Internet Explorer mode, making it a tricky flaw to exploit. However, even with these pre-requisites, the South Korean National Cyber Security Center(NCSC) and AhnLab disclosed the flaw as being exploited in attacks. CVE-2024-38193 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability This vulnerability allows attacks to gain SYSTEM privileges on Windows systems. The flaw was discovered by Luigino Camastra and Milánek with Gen Digital but Microsoft did not share any details on how it was disclosed. CVE-2024-38213 - Windows Mark of the Web Security Feature Bypass Vulnerability This vulnerability allows attackers to create files that bypass Windows Mark of the Web security alerts. This security feature has been subject to numerous bypasses over the year as it is an attractive target for threat actors who conduct phishing campaigns. Microsoft says the flaw was discovered by Peter Girnus of Trend Micro's Zero Day Initiative but did not share how it is exploited in attacks. CVE-2024-38106 - Windows Kernel Elevation of Privilege Vulnerability Microsoft fixed a Windows Kernel elevation of privileges flaw that gives SYSTEM privileges. "Successful exploitation of this vulnerability requires an attacker to win a race condition," explains Microsoft's advisory. "An attacker who successfully exploited this vulnerability could gain SYSTEM privileges," continued Microsoft. Microsoft has not shared who disclosed the flaw and how it was exploited. CVE-2024-38107 - Windows Power Dependency Coordinator Elevation of Privilege Vulnerability Microsoft fixed a flaw that gives attackers SYSTEM privileges on the Windows device. Microsoft has not shared who disclosed the flaw and how it was exploited. CVE-2024-38189 - Microsoft Project Remote Code Execution Vulnerability Microsoft fixed a Microsoft Project remote code execution vulnerability that requires security features to be disabled for exploitation. "Exploitation requires the victim to open a malicious Microsoft Office Project file on a system where the Block macros from running in Office files from the Internet policy is disabled and VBA Macro Notification Settings are not enabled allowing the attacker to perform remote code execution," explain the advisory. Microsoft says that the attackers would need to trick a user into opening the malicious file, such as through phishing attacks or by luring users to websites hosting the file. Microsoft has not disclosed who discovered the vulnerability or how it was exploited in attacks. The four publicly disclosed vulnerabilities are: CVE-2024-38199 - Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability Microsoft has fixed a remote code execution vulnerability in the Windows Line Printer Daemon. "An unauthenticated attacker could send a specially crafted print task to a shared vulnerable Windows Line Printer Daemon (LPD) service across a network. Successful exploitation could result in remote code execution on the server," explains Microsoft's advisory. This vulnerability is listed as publicly disclosed but the person who disclosed it wished to remain Anonymous. CVE-2024-21302 - Windows Secure Kernel Mode Elevation of Privilege Vulnerability This flaw was disclosed by SafeBreach security researcher Alon Leviev as part of a Windows Downdate downgrade attack talk at Black Hat 2024. The Windows Downdate attack unpatches fully updated Windows 10, Windows 11, and Windows Server systems to reintroduce old vulnerabilities using specially crafted updates. This flaw allowed the attackers to gain elevated privileges to install the malicious updates. CVE-2024-38200 - Microsoft Office Spoofing Vulnerability Microsoft fixed a Microsoft Office vulnerability that exposes NTLM hashes as disclosed in the "NTLM - The last ride" Defcon talk. Attackers could exploit the flaw by tricking someone into opening a malicious file, which would then force Office to make an outbound connect to a remote share where attackers could steal sent NTLM hashes. The flaw was discovered by Jim Rush with PrivSec and was already fixed via Microsoft Office Feature Flighting on 7/30/2024. CVE-2024-38202 - Windows Update Stack Elevation of Privilege Vulnerability This flaw was also part of the Windows Downdate downgrade attack talk at Black Hat 2024. Microsoft is developing a security update to mitigate this threat, but it is not yet available. Recent updates from other companies Other vendors who released updates or advisories in August 2024 include: The August 2024 Patch Tuesday Security Updates Below is the complete list of resolved vulnerabilities in the August 2024 Patch Tuesday updates. To access the full description of each vulnerability and the systems it affects, you can view the full report here.

Daily Brief Summary

MALWARE // Microsoft Fixes Six Exploited Zero-Days in August 2024 Update

Microsoft's August 2024 Patch Tuesday addressed 89 security issues, including nine zero-days, six of which were actively exploited.

Updates targeted various vulnerabilities, including critical ones, across several Windows applications and systems.

Identified exploits include remote code execution, elevation of privilege, and security feature bypass vulnerabilities.

Among the fixed zero-days, vulnerabilities involved issues in the Windows Kernel, Windows Ancillary Function Driver for WinSock, and Microsoft Project.

Four additional vulnerabilities were only publicly disclosed but not yet exploited, including ones in Microsoft Office and Windows Line Printer Daemon.

Remains of one publicly disclosed zero-day still await a security patch from Microsoft.

Other technology companies also released updates and advisories, indicating a widespread focus on improving cybersecurity posture this month.