{"id":5977,"date":"2024-11-13T03:12:54","date_gmt":"2024-11-13T03:12:54","guid":{"rendered":"https:\/\/tech.newat9.com\/index.php\/2024\/11\/13\/vert-threat-alert-november-2024-patch-tuesday-analysis\/"},"modified":"2024-11-13T03:12:54","modified_gmt":"2024-11-13T03:12:54","slug":"vert-threat-alert-november-2024-patch-tuesday-analysis","status":"publish","type":"post","link":"https:\/\/tech.newat9.com\/index.php\/2024\/11\/13\/vert-threat-alert-november-2024-patch-tuesday-analysis\/","title":{"rendered":"VERT Threat Alert: November 2024 Patch Tuesday Analysis"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Today\u2019s VERT Alert addresses Microsoft\u2019s\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-nov\" target=\"_blank\" rel=\"noopener\">November 2024 Security Updates<\/a>. VERT is actively working on coverage for these vulnerabilities and expects to ship ASPL-1132 as soon as coverage is completed.<\/p>\n<p>\u00a0<\/p>\n<h2><strong>In-The-Wild &amp; Disclosed CVEs<\/strong><\/h2>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-43451\" target=\"_blank\" rel=\"noopener\">CVE-2024-43451<\/a><\/p>\n<p>A vulnerability that allows for NTLMv2 hash disclosure has been both publicly disclosed and actively exploited. According to Microsoft, only minimal interaction is required and a user left or right clicking on a malicious file is enough to trigger this vulnerability. Microsoft has reported this vulnerability as <strong>Exploitation Detected<\/strong>.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-49039\" target=\"_blank\" rel=\"noopener\">CVE-2024-49039<\/a><\/p>\n<p>Microsoft is reporting that a privilege escalation exists within Windows Task Scheduler that could allow a low privilege user to elevate their permissions to a Medium Integrity Level. For example, an attacker could escalate their permissions from a low privilege AppContainer to a higher integrity level and execute code. Microsoft has reported this vulnerability as <strong>Exploitation Detected<\/strong>.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-49040\" target=\"_blank\" rel=\"noopener\">CVE-2024-49040<\/a><\/p>\n<p>A vulnerability in Microsoft Exchange Server allows non-RFC 5322 compliant P2 FROM headers to pass to the email client, which can allow the sender of an email to be spoofed. After installing the Exchange update, a new disclaimer will be prepended to the message body and a new header will be added. Users can then\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/exchange\/plan-and-deploy\/post-installation-tasks\/security-best-practices\/exchange-non-compliant-p2from-detection?view=exchserver-2019\" target=\"_blank\" rel=\"noopener\">follow guidance from Microsoft<\/a> to take additional steps, such as rejecting the email if the header is detected. Users can also disable this functionality. Microsoft has reported this vulnerability as <strong>Exploitation More Likely<\/strong>.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-49019\" target=\"_blank\" rel=\"noopener\">CVE-2024-49019<\/a><\/p>\n<p>A vulnerability in Active Directory Certificate Services could allow an attacker to gain domain administrator privileges. According to Microsoft, you may be vulnerable if your PKI environment has the following:<\/p>\n<ul>\n<li>A published certificate using the <em>version 1 certificate template<\/em>.<\/li>\n<li>The <strong>Source of subject name<\/strong> is set to \u201cSupplied in the request\u201d<\/li>\n<li>The <strong>Enroll <\/strong>permissions are granted to a broad set of accounts,<\/li>\n<\/ul>\n<p>Microsoft has reported this vulnerability as <strong>Exploitation More Likely<\/strong>.<\/p>\n<p>\u00a0<\/p>\n<h2><strong>CVE Breakdown by Tag<\/strong><\/h2>\n<p>While historical Microsoft Security Bulletin groupings are gone, Microsoft vulnerabilities are tagged with an identifier. This list provides a breakdown of the CVEs on a per tag basis. Vulnerabilities are also colour coded to aid with identifying key issues.<\/p>\n<ul>\n<li>Traditional Software<\/li>\n<li><span style=\"color:#00b050;\">Mobile Software<\/span><\/li>\n<li><span style=\"color:#0070c0;\">Cloud or Cloud Adjacent<\/span><\/li>\n<li><span style=\"background-color:yellow;\">Vulnerabilities that are being exploited or that have been disclosed will be highlighted<\/span><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\" width=\"639\">\n<tbody>\n<tr>\n<td width=\"293\"><strong>Tag<\/strong><\/td>\n<td width=\"104\"><strong>CVE Count<\/strong><\/td>\n<td width=\"242\"><strong>CVEs<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows Update Stack<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-43530<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">.NET and Visual Studio<\/td>\n<td width=\"104\">2<\/td>\n<td width=\"242\">CVE-2024-43499, CVE-2024-43498<\/td>\n<\/tr>\n<tr>\n<td width=\"293\"><span style=\"color:#0070c0;\">Azure CycleCloud<\/span><\/td>\n<td width=\"104\"><span style=\"color:#0070c0;\">1<\/span><\/td>\n<td width=\"242\"><span style=\"color:#0070c0;\">CVE-2024-43602<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows NT OS Kernel<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-43623<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows VMSwitch<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-43625<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows Telephony Service<\/td>\n<td width=\"104\">7<\/td>\n<td width=\"242\">CVE-2024-43626, CVE-2024-43627, CVE-2024-43628, CVE-2024-43620, CVE-2024-43621, CVE-2024-43622, CVE-2024-43635<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows Kernel<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-43630<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows Secure Kernel Mode<\/td>\n<td width=\"104\">3<\/td>\n<td width=\"242\">CVE-2024-43631, CVE-2024-43646, CVE-2024-43640<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows USB Video Driver<\/td>\n<td width=\"104\">5<\/td>\n<td width=\"242\">CVE-2024-43634, CVE-2024-43637, CVE-2024-43638, CVE-2024-43643, CVE-2024-43449<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows CSC Service<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-43644<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows Defender Application Control (WDAC)<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-43645<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows SMBv3 Client\/Server<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-43447<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Microsoft Windows DNS<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-43450<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows NTLM<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\"><span style=\"background-color:yellow;\">CVE-2024-43451<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows Registry<\/td>\n<td width=\"104\">2<\/td>\n<td width=\"242\">CVE-2024-43452, CVE-2024-43641<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">SQL Server<\/td>\n<td width=\"104\">31<\/td>\n<td width=\"242\">CVE-2024-38255, CVE-2024-43459, CVE-2024-43462, CVE-2024-48994, CVE-2024-48995, CVE-2024-48996, CVE-2024-49043, CVE-2024-48993, CVE-2024-48997, CVE-2024-48998, CVE-2024-48999, CVE-2024-49000, CVE-2024-49001, CVE-2024-49002, CVE-2024-49003, CVE-2024-49004, CVE-2024-49005, CVE-2024-49007, CVE-2024-49006, CVE-2024-49008, CVE-2024-49009, CVE-2024-49010, CVE-2024-49011, CVE-2024-49012, CVE-2024-49013, CVE-2024-49014, CVE-2024-49015, CVE-2024-49016, CVE-2024-49017, CVE-2024-49018, CVE-2024-49021<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Microsoft Virtual Hard Drive<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-38264<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Microsoft Defender for Endpoint<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-5535<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Microsoft Exchange Server<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\"><span style=\"background-color:yellow;\">CVE-2024-49040<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Visual Studio<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-49044<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows Win32 Kernel Subsystem<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-49046<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Visual Studio Code<\/td>\n<td width=\"104\">2<\/td>\n<td width=\"242\">CVE-2024-49049, CVE-2024-49050<\/td>\n<\/tr>\n<tr>\n<td width=\"293\"><span style=\"color:#0070c0;\">Airlift.microsoft.com<\/span><\/td>\n<td width=\"104\"><span style=\"color:#0070c0;\">1<\/span><\/td>\n<td width=\"242\"><span style=\"color:#0070c0;\">CVE-2024-49056<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"293\">LightGBM<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-43598<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Role: Windows Hyper-V<\/td>\n<td width=\"104\">2<\/td>\n<td width=\"242\">CVE-2024-43624, CVE-2024-43633<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows DWM Core Library<\/td>\n<td width=\"104\">2<\/td>\n<td width=\"242\">CVE-2024-43629, CVE-2024-43636<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows Kerberos<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-43639<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows SMB<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-43642<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows Package Library Manager<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-38203<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Role: Windows Active Directory Certificate Services<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\"><span style=\"background-color:yellow;\">CVE-2024-49019<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Microsoft Office Excel<\/td>\n<td width=\"104\">5<\/td>\n<td width=\"242\">CVE-2024-49026, CVE-2024-49027, CVE-2024-49028, CVE-2024-49029, CVE-2024-49030<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Microsoft Graphics Component<\/td>\n<td width=\"104\">2<\/td>\n<td width=\"242\">CVE-2024-49031, CVE-2024-49032<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Microsoft Office Word<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-49033<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Windows Task Scheduler<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\"><span style=\"background-color:yellow;\">CVE-2024-49039<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"293\">TorchGeo<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-49048<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Microsoft PC Manager<\/td>\n<td width=\"104\">1<\/td>\n<td width=\"242\">CVE-2024-49051<\/td>\n<\/tr>\n<tr>\n<td width=\"293\">Microsoft Edge (Chromium-based)<\/td>\n<td width=\"104\">2<\/td>\n<td width=\"242\">CVE-2024-10826, CVE-2024-10827<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong>Other Information<\/strong><\/h2>\n<p>At the time of publication, there was one new advisory included with the November Security Guidance.<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/ADV240001\" target=\"_blank\" rel=\"noopener\"><strong>Microsoft SharePoint Server Defense in Depth Update [ADV240001]<\/strong><\/a><\/p>\n<p>Microsoft has published an advisory related to Microsoft SharePoint Server that provides a defense in depth update regarding redirections. Microsoft SharePoint Server Subscriber Edition, 2019, and 2016 have updates available for them.\u00a0<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.tripwire.com\/state-of-security\/vert-threat-alert-november-2024-patch-tuesday-analysis\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today\u2019s VERT Alert addresses Microsoft\u2019s\u00a0November 2024 Security Updates. VERT is actively working on coverage for these vulnerabilities and expects to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5978,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/posts\/5977"}],"collection":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/comments?post=5977"}],"version-history":[{"count":0,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/posts\/5977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/media\/5978"}],"wp:attachment":[{"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/media?parent=5977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/categories?post=5977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.newat9.com\/index.php\/wp-json\/wp\/v2\/tags?post=5977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}