November 2024 Windows Patch Tuesday: 89 Fixes & Key Vulnerabilities

  • Thread Author
It’s that time of the month again when Windows users find themselves bracing for impact. November Patch Tuesday has rolled in like a freight train, delivering a staggering 89 fixes across a variety of Windows platforms. For the uninitiated, Patch Tuesday is a monthly event where Microsoft releases updates to address security vulnerabilities and bugs. This latest update cycle, specifically for November 2024, is particularly notable for both users and administrators alike.

The Breakdown of Patches​

Out of the 89 fixes issued, only four vulnerabilities were deemed critical, while a whopping 84 were marked as important. For non-techies, that means you'd likely need to have local access to the system to exploit most of these flaws. However, five of these vulnerabilities are currently seeing active exploitation, warranting immediate attention.

Key Vulnerabilities to Watch​

  • CVE-2024-43451: This is the crown jewel in the list of critical vulnerabilities. It's a key disclosure flaw in Internet Explorer that's being actively exploited. How does this work? Well, the bug affects MSHTML, a component of Internet Explorer, enabling attackers to obtain a victim's NTLMv2 hash. Picture this: yes, Internet Explorer is still a target—who knew this ancient browser had legs left to stand on?
Dustin Childs, a researcher associated with the Trend Micro Zero Day Initiative, warns that user interaction is required for this exploit, but that’s a mere speed bump for adversaries. "I wouldn’t wait to test and deploy this update," he advises.
  • CVE-2024-43639: At a staggering 9.8 CVSS rating, this flaw allows remote code execution on Windows Server systems through Kerberos commands. Given that Kerberos operates with elevated privileges, this vulnerability could be highly wormable. Essentially, it could leapfrog across multiple systems, making it a serious concern for any server environment.
  • CVE-2024-49039: This particular vulnerability exists in the Windows Task Scheduler and offers the potential for elevation of privilege—a neat trick for anyone looking to gain unauthorized access.
  • CVE-2024-43498: This one impacts .NET and Visual Studio, allowing remote code execution (yes, again!). This should also be on your urgent update list.

SQL Server and Other Vulnerabilities​

The remaining vulnerabilities were found in products like Azure, Office, and SQL Server, but they generally require specific conditions to be exploited, such as connecting to a malicious SQL database. Childs also highlighted CVE-2024-49043, which requires an update to OLE DB Driver 18 or 19, and possibly some third-party fixes. So, if you’re managing SQL databases, pay meticulous attention to this one!

Implications for Users​

For ordinary users and system administrators, the November Patch Tuesday update serves as a crucial reminder of the ever-evolving landscape of cybersecurity threats. The sheer amount of patches may overwhelm some, but it underscores the necessity for vigilance in maintaining system security.
Updating Windows is not merely an afterthought. It becomes an act of self-preservation, akin to checking your locks before leaving home. Keep in mind that neglecting such updates might invite unwanted guests (read: hackers) to your digital doorstep.

Steps to Follow​

  1. Backup Your Data: Always back up your critical files before applying system updates.
  2. Check for Updates: Go to Windows Settings > Update & Security > Windows Update, then click "Check for updates."
  3. Read the Details: Review the details of the patches specified in the update window.
  4. Install Updates: Install all available updates, prioritizing those marked as critical or important.
  5. Restart and Verify: After the installation, restart your device and confirm that everything functions as expected.

The Bigger Picture​

In a broader context, this month's patch cycle is reflective of the cybersecurity landscape at large. With increasing attacks targeting legacy systems and benign tools like Internet Explorer, organizations can't afford to overlook these updates. Vulnerabilities, like those found in Kerberos and .NET, stress the importance of managing access and permissions effectively to prevent exploitation.
Remember: A proactive approach to software updates often separates secure systems from vulnerable ones.

Wrapping Up​

As we head further into the digital era, navigating the sea of vulnerabilities is akin to steering a ship through a storm—requires constant vigilance and adaptability. The November Patch Tuesday is a robust reminder of that ongoing journey. So, roll up your sleeves, fire up your Windows updates, and fortify your systems—your security is in your hands!
Stay safe, and happy patching!

Source: SC Media November Patch Tuesday brings cornucopia of 89 fixes to Windows
 


Back
Top