On August 14, 2024, Microsoft rolled out its latest Patch Tuesday updates, addressing a significant number of vulnerabilities affecting Windows 10 and Windows 11. This month’s release is particularly noteworthy, featuring fixes for 90 vulnerabilities across various Microsoft products, including critical flaws in Windows, Office, and Azure services.
The August updates are a response to numerous security risks, with the Zero Day Initiative reporting seven vulnerabilities categorized as critical. Below are some key highlights from the vulnerabilities addressed:
August 2024 Patch Tuesday Updates Fix 90 Vulnerabilities
The August updates are a response to numerous security risks, with the Zero Day Initiative reporting seven vulnerabilities categorized as critical. Below are some key highlights from the vulnerabilities addressed:- CVE-2024-38189: A vulnerability within Microsoft Project that could allow remote code execution if attackers can trick a user into opening a malicious file.
- CVE-2024-38178: A memory corruption issue located in the Windows Scripting Engine.
- CVE-2024-38213: This zero-day flaw exploits the Windows Mark of the Web security measures, allowing attackers to inject malicious files into networks.
- CVE-2024-38193: A Windows Ancillary Function Driver vulnerability enabling system-level privileges for hackers. Microsoft's informative advisory emphasizes the urgency of applying these updates, particularly in light of malware threats that exploit newly disclosed vulnerabilities.
New Windows Features and Updates
Beyond security patches, the update introduces practical features for users. In Windows 11, version updates permit dragging app shortcuts directly from the Start menu to the Taskbar, enhancing accessibility and usability.- Windows 11:
- KB5041585 Update: For versions 22H2 and 23H2, this update adds the ability to drag app shortcuts into the Taskbar, streamlining user interactions.
- KB5041571 Update: For those on version 24H2, a similar drag-and-drop feature is now available.
- Windows 10:
- KB5041580 Update: This addresses a bug related to the BitLocker recovery screen and aims to resolve existing issues preventing users from changing profile pictures.
Quality and Experience Updates
Microsoft recommends that organizations thoroughly test these updates in a controlled environment before deploying them widely. Testing ensures compatibility with existing systems and prevents potential disruptions in business operations due to unforeseen issues that can arise post-update. A key best practice is to conduct regular backups of systems. Microsoft provides built-in tools that enable users to restore entire systems or specific files, which is critical if an update causes unexpected failures or data losses.Compliance and Safety Recommendations
In conjunction with issuing these updates, Microsoft highlights the necessity for users of Windows 11 versions 22H2 Home and Pro editions to upgrade to newer builds to continue receiving important security updates. The end of support for these versions is set for October 8, 2024. Users are strongly advised to plan their upgrade paths accordingly. As cyber threats evolve, staying proactive and informed becomes even more crucial. The August updates reflect Microsoft’s commitment to enhancing users' security while also improving the overall user experience across its platforms.Conclusion
The August 2024 Patch Tuesday updates are essential for maintaining security and improving usability in Windows 10 and 11. With 90 vulnerabilities addressed, including critical flaws that could lead to significant security breaches, users must prioritize these updates. Microsoft continues to not only patch vulnerabilities but also enhance the overall user experience with thoughtful feature updates. As the digital landscape becomes increasingly hostile, timely updates and a rigorous backup strategy are vital to protecting personal and organizational data. Users are encouraged to stay informed about these changes and apply the updates at their earliest convenience. For more technical details or specific updates, you can refer to Microsoft's original security advisory document.
Source: Petri IT Knowledgebase
Last edited: