<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Patch Manager Plus Archives - ManageEngine Blog</title>
	<atom:link href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/feed" rel="self" type="application/rss+xml" />
	<link>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus</link>
	<description></description>
	<lastBuildDate>Tue, 11 Mar 2025 20:28:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>
	<item>
		<title>March Patch Tuesday comes with fixes for 57 vulnerabilities, including 7 zero-days</title>
		<link>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/03/12/march-patch-tuesday-comes-with-fixes-for-57-vulnerabilities-including-7-zero-days.html</link>
					<comments>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/03/12/march-patch-tuesday-comes-with-fixes-for-57-vulnerabilities-including-7-zero-days.html#respond</comments>
		
		<dc:creator><![CDATA[Hareesh]]></dc:creator>
		<pubDate>Tue, 11 Mar 2025 20:28:49 +0000</pubDate>
				<category><![CDATA[Patch Manager Plus]]></category>
		<category><![CDATA[march patch tuesday]]></category>
		<category><![CDATA[Microsoft Patch Tuesday 2025]]></category>
		<category><![CDATA[Microsoft patch Tuesday March]]></category>
		<category><![CDATA[zero day vulnerabilties]]></category>
		<guid isPermaLink="false">https://blogs.manageengine.com/?p=102842</guid>

					<description><![CDATA[<p>Welcome to the third Patch Tuesday of the year; let’s find out what new surprises and challenges await. This month, there are 57 vulnerabilities, seven...</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/03/12/march-patch-tuesday-comes-with-fixes-for-57-vulnerabilities-including-7-zero-days.html">March Patch Tuesday comes with fixes for 57 vulnerabilities, including 7 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:&quot;13.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="8pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2" data-doc-id="4504799000126085558" data-doc-type="writer">Welcome to the third Patch Tuesday of the year; let’s find out what new surprises and challenges await. This month, there are 57 vulnerabilities, seven of which are zero-days. This time, six of the zero-days are being actively exploited.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:&quot;13.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="8pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2" data-doc-id="4504799000126085558" data-doc-type="writer">After an initial discussion about this month’s updates, we’ll offer our advice for devising a plan to handle patch management in a hybrid work environment. You can also <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">register</a> for our free Patch Tuesday webinar and listen to our experts break down Patch Tuesday updates in detail.</p>
<h2 class="zw-paragraph heading2" data-header="2" data-margin-bottom="12pt" data-margin-top="14.94pt" data-hd-info="2" data-line-height="1.2" data-doc-id="4504799000126085558" data-doc-type="writer"><strong>What is Patch Tuesday?  </strong></h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Patch Tuesday falls on the second Tuesday of every month. This is when, Microsoft releases security and non-security updates for its operating system and other related applications. Since Microsoft has upheld this process of releasing updates in a periodic manner, IT admins expect these updates and have time to gear up for them.</p>
<h2 class="zw-paragraph heading2" data-header="2" data-margin-bottom="12pt" data-margin-top="14.94pt" data-hd-info="2" data-line-height="1.2">Why is Patch Tuesday important?<span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_xl7tq6lmbgx4&quot;,&quot;name&quot;:&quot;_Tocpy5lsj2xlwrr&quot;}" data-bookmark-id="toc_xl7tq6lmbgx4"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_xl7tq6lmbgx4&quot;,&quot;name&quot;:&quot;_Tocpy5lsj2xlwrr&quot;}" data-bookmark-id="toc_xl7tq6lmbgx4"> </span></h2>
<p>Important security updates and patches to fix critical bugs or vulnerabilities are released on Patch Tuesday. Usually, zero-day vulnerabilities are also fixed during Patch Tuesday, unless the vulnerability is critical and highly exploited, in which case an out-of-band security update is released to address that particular vulnerability.</p>
<h2><span data-doc-id="4504799000126085558" data-doc-type="writer">March 2025 Patch Tuesday</span></h2>
<h3><span data-doc-id="4504799000126085558" data-doc-type="writer">Security Updates Lineup</span></h3>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:&quot;13.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2" data-doc-id="4504799000126085558" data-doc-type="writer">Here is a breakdown of the vulnerabilities fixed this month:</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:&quot;13.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVE IDs:</strong> 57</p>
<p><strong>Republished CVE IDs:</strong> 10 (more details on this below)</p>
<h4><span data-doc-id="4504799000126085558" data-doc-type="writer">Security updates were released for the following products, features, and roles:</span><span data-range-char-type="start" data-bookmark-info="{&quot;name&quot;:&quot;_Toc90a77ykvxg0k&quot;,&quot;id&quot;:&quot;toc_mh1z11ma361w&quot;,&quot;type&quot;:&quot;bookmark&quot;,&quot;render_type&quot;:&quot;inline&quot;,&quot;geo_transformation&quot;:{&quot;translation&quot;:{&quot;x&quot;:false,&quot;y&quot;:false},&quot;scaling&quot;:{&quot;x&quot;:false,&quot;y&quot;:false},&quot;rotation&quot;:false}}" data-bookmark-id="toc_mh1z11ma361w"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;name&quot;:&quot;_Toc90a77ykvxg0k&quot;,&quot;id&quot;:&quot;toc_mh1z11ma361w&quot;,&quot;type&quot;:&quot;bookmark&quot;}" data-bookmark-id="toc_mh1z11ma361w"> </span></h4>
<ul data-list-id="33096091" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}" data-doc-id="4504799000126085558" data-doc-type="writer">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="33096091" data-list-info="{&quot;id&quot;:&quot;33096091&quot;,&quot;l&quot;:0}">Windows exFAT File System</p>
</li>
</ul>
<ul data-list-id="77387671" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="77387671" data-list-info="{&quot;id&quot;:&quot;77387671&quot;,&quot;l&quot;:0}">Azure Agent Installer</p>
</li>
</ul>
<ul data-list-id="92714358" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="92714358" data-list-info="{&quot;id&quot;:&quot;92714358&quot;,&quot;l&quot;:0}">Windows MapUrlToZone</p>
</li>
</ul>
<ul data-list-id="55771776" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="55771776" data-list-info="{&quot;id&quot;:&quot;55771776&quot;,&quot;l&quot;:0}">Windows Remote Desktop Services</p>
</li>
</ul>
<ul data-list-id="15356976" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="15356976" data-list-info="{&quot;id&quot;:&quot;15356976&quot;,&quot;l&quot;:0}">.NET</p>
</li>
</ul>
<ul data-list-id="97119451" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="97119451" data-list-info="{&quot;id&quot;:&quot;97119451&quot;,&quot;l&quot;:0}">Windows Win32 Kernel Subsystem</p>
</li>
</ul>
<ul data-list-id="29743512" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="29743512" data-list-info="{&quot;id&quot;:&quot;29743512&quot;,&quot;l&quot;:0}">Microsoft Streaming Service</p>
</li>
</ul>
<ul data-list-id="37921629" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="37921629" data-list-info="{&quot;id&quot;:&quot;37921629&quot;,&quot;l&quot;:0}">Role: Windows Hyper-V</p>
</li>
</ul>
<ul data-list-id="19558517" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="19558517" data-list-info="{&quot;id&quot;:&quot;19558517&quot;,&quot;l&quot;:0}">Azure CLI</p>
</li>
</ul>
<ul data-list-id="15408495" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="15408495" data-list-info="{&quot;id&quot;:&quot;15408495&quot;,&quot;l&quot;:0}">Windows Routing and Remote Access Service (RRAS)</p>
</li>
</ul>
<ul data-list-id="44474093" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="44474093" data-list-info="{&quot;id&quot;:&quot;44474093&quot;,&quot;l&quot;:0}">Windows NTLM</p>
</li>
</ul>
<ul data-list-id="28282895" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="28282895" data-list-info="{&quot;id&quot;:&quot;28282895&quot;,&quot;l&quot;:0}">Windows USB Video Driver</p>
</li>
</ul>
<ul data-list-id="24752476" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="24752476" data-list-info="{&quot;id&quot;:&quot;24752476&quot;,&quot;l&quot;:0}">Windows Telephony Server</p>
</li>
</ul>
<ul data-list-id="90542980" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="90542980" data-list-info="{&quot;id&quot;:&quot;90542980&quot;,&quot;l&quot;:0}">Microsoft Office</p>
</li>
</ul>
<ul data-list-id="73472871" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="73472871" data-list-info="{&quot;id&quot;:&quot;73472871&quot;,&quot;l&quot;:0}">Windows Common Log File System Driver</p>
</li>
</ul>
<ul data-list-id="97177721" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="97177721" data-list-info="{&quot;id&quot;:&quot;97177721&quot;,&quot;l&quot;:0}">Windows Mark of the Web (MOTW)</p>
</li>
</ul>
<ul data-list-id="82998104" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="82998104" data-list-info="{&quot;id&quot;:&quot;82998104&quot;,&quot;l&quot;:0}">Role: DNS Server</p>
</li>
</ul>
<ul data-list-id="25996169" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="25996169" data-list-info="{&quot;id&quot;:&quot;25996169&quot;,&quot;l&quot;:0}">Windows Kernel-Mode Drivers</p>
</li>
</ul>
<ul data-list-id="67977033" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="67977033" data-list-info="{&quot;id&quot;:&quot;67977033&quot;,&quot;l&quot;:0}">ASP.NET Core &amp; Visual Studio</p>
</li>
</ul>
<ul data-list-id="88846788" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="88846788" data-list-info="{&quot;id&quot;:&quot;88846788&quot;,&quot;l&quot;:0}">Windows File Explorer</p>
</li>
</ul>
<ul data-list-id="83274833" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="83274833" data-list-info="{&quot;id&quot;:&quot;83274833&quot;,&quot;l&quot;:0}">Microsoft Local Security Authority Server (lsasrv)</p>
</li>
</ul>
<ul data-list-id="85999124" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="85999124" data-list-info="{&quot;id&quot;:&quot;85999124&quot;,&quot;l&quot;:0}">Windows Cross Device Service</p>
</li>
</ul>
<ul data-list-id="91255331" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="91255331" data-list-info="{&quot;id&quot;:&quot;91255331&quot;,&quot;l&quot;:0}">Microsoft Office Word</p>
</li>
</ul>
<ul data-list-id="48708613" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="48708613" data-list-info="{&quot;id&quot;:&quot;48708613&quot;,&quot;l&quot;:0}">Microsoft Office Excel</p>
</li>
</ul>
<ul data-list-id="26569020" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="26569020" data-list-info="{&quot;id&quot;:&quot;26569020&quot;,&quot;l&quot;:0}">Windows Subsystem for Linux</p>
</li>
</ul>
<ul data-list-id="31176302" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="31176302" data-list-info="{&quot;id&quot;:&quot;31176302&quot;,&quot;l&quot;:0}">Windows NTFS</p>
</li>
</ul>
<ul data-list-id="69686667" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="69686667" data-list-info="{&quot;id&quot;:&quot;69686667&quot;,&quot;l&quot;:0}">Windows Fast FAT Driver</p>
</li>
</ul>
<ul data-list-id="41893962" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="41893962" data-list-info="{&quot;id&quot;:&quot;41893962&quot;,&quot;l&quot;:0}">Azure PromptFlow</p>
</li>
</ul>
<ul data-list-id="38992003" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="38992003" data-list-info="{&quot;id&quot;:&quot;38992003&quot;,&quot;l&quot;:0}">Windows Kernel Memory</p>
</li>
</ul>
<ul data-list-id="64749095" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="64749095" data-list-info="{&quot;id&quot;:&quot;64749095&quot;,&quot;l&quot;:0}">Visual Studio</p>
</li>
</ul>
<ul data-list-id="42383279" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="42383279" data-list-info="{&quot;id&quot;:&quot;42383279&quot;,&quot;l&quot;:0}">Microsoft Windows</p>
</li>
</ul>
<ul data-list-id="33789388" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="33789388" data-list-info="{&quot;id&quot;:&quot;33789388&quot;,&quot;l&quot;:0}">Azure Arc</p>
</li>
</ul>
<ul data-list-id="40284181" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="40284181" data-list-info="{&quot;id&quot;:&quot;40284181&quot;,&quot;l&quot;:0}">Microsoft Office Access</p>
</li>
</ul>
<ul data-list-id="52216117" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="52216117" data-list-info="{&quot;id&quot;:&quot;52216117&quot;,&quot;l&quot;:0}">Visual Studio Code</p>
</li>
</ul>
<ul data-list-id="68565491" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="68565491" data-list-info="{&quot;id&quot;:&quot;68565491&quot;,&quot;l&quot;:0}">Microsoft Management Console</p>
</li>
</ul>
<ul data-list-id="15459055" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="15459055" data-list-info="{&quot;id&quot;:&quot;15459055&quot;,&quot;l&quot;:0}">Microsoft Edge (Chromium-based)</p>
</li>
</ul>
<ul data-list-id="55937036" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="55937036" data-list-info="{&quot;id&quot;:&quot;55937036&quot;,&quot;l&quot;:0}">Remote Desktop Client</p>
</li>
</ul>
<p>Learn more in the <a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Mar" target="undefined">MSRC’s release notes.</a></p>
<h3 class="zw-paragraph heading3" data-header="3" data-margin-bottom="14.04pt" data-margin-top="14.04pt" data-hd-info="3" data-line-height="1.2" data-doc-id="4504799000126085558" data-doc-type="writer">Details of the zero-day vulnerabilities</h3>
<ul data-list-id="82256331" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="82256331" data-list-info="{&quot;id&quot;:&quot;82256331&quot;,&quot;l&quot;:0}"><a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24983" target="undefined">CVE-2025-24983</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable Component:</strong> Windows Win32 Kernel Subsystem</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Elevation of Privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.0</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(34, 34, 34)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">Microsoft has resolved a security vulnerability that enabled local attackers to gain SYSTEM privileges through the exploitation of a race condition. Currently, specific details on the exploitation method have not been disclosed by Microsoft. The vulnerability was identified by Filip Jurčacko from ESET, and further information is anticipated to be released in due course.</p>
<ul data-list-id="68406648" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="68406648" data-list-info="{&quot;id&quot;:&quot;68406648&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24984" target="undefined">CVE-2025-24984</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable Component:</strong> Windows NTFS</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Information Disclosure</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 4.6</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability can be exploited by attackers with physical access to the device by inserting a malicious USB drive. Exploiting this flaw enables attackers to read portions of heap memory and steal information. Microsoft notes that the vulnerability was disclosed anonymously.</p>
<ul data-list-id="57363550" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="57363550" data-list-info="{&quot;id&quot;:&quot;57363550&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24985" target="undefined">CVE-2025-24985</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable Component:</strong> Windows Fast FAT File System Driver</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Remote Code Execution</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(34, 34, 34)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">A remote code execution vulnerability is present due to an integer overflow in the Windows Fast FAT Driver. Exploitation of this flaw requires an attacker to deceive a local user into mounting a specially crafted VHD. While Microsoft has not shared specific exploitation methods, it notes that malicious VHD images have been used in past phishing attacks and through pirated software. This vulnerability was disclosed anonymously.</p>
<ul data-list-id="82216410" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="82216410" data-list-info="{&quot;id&quot;:&quot;82216410&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24991" target="undefined">CVE-2025-24991</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable Component:</strong> Windows NTFS</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Information Disclosure</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 5.5</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(34, 34, 34)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">Microsoft indicates that attackers can leverage this flaw to access small segments of heap memory and extract sensitive information. Exploitation involves deceiving a user into mounting a malicious VHD file. This vulnerability was disclosed anonymously.</p>
<ul data-list-id="96226184" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="96226184" data-list-info="{&quot;id&quot;:&quot;96226184&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24993" target="undefined">CVE-2025-24993</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable Component: </strong>Windows NTFS</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact: </strong>Remote Code Execution</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(34, 34, 34)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">A heap-based buffer overflow vulnerability in Windows NTFS permits an attacker to execute arbitrary code. This flaw can be exploited by persuading a local user to mount a specially crafted VHD. The vulnerability was disclosed anonymously.<span class="EOP"> </span></p>
<ul data-list-id="59362006" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="59362006" data-list-info="{&quot;id&quot;:&quot;59362006&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26633" target="undefined">CVE-2025-26633</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable Component: </strong>Microsoft Management Console</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Security Feature Bypass</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.0</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:13.5,&quot;fgc&quot;:&quot;rgb(34, 34, 34)&quot;,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">This vulnerability allows malicious .msc files to bypass Windows security features and execute arbitrary code. Exploiting this flaw requires attackers to convince users to open a malicious file, typically distributed through email or instant messaging. While users cannot be compelled to view content controlled by an attacker, social engineering tactics may be employed. This vulnerability was discovered by Aliakbar Zahravi from Trend Micro, though specific exploitation details have not been disclosed.</p>
<ul data-list-id="63368785" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="63368785" data-list-info="{&quot;id&quot;:&quot;63368785&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-26630" target="undefined">CVE-2025-26630</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable Component:</strong> Microsoft Access</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact: </strong>Remote Code Execution</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p>A use-after-free memory bug in Microsoft Office Access enables remote code execution. To exploit this flaw, an attacker would need to trick a user into opening a specially crafted Access file. This can be achieved through phishing or social engineering attacks, but the flaw cannot be exploited through the preview pane. Microsoft has not shared the details on who disclosed this flaw.</p>
<h3><span data-doc-id="4504799000126085558" data-doc-type="writer">Republished CVE IDs</span></h3>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:&quot;13.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2" data-doc-id="4504799000126085558" data-doc-type="writer">Besides the vulnerabilities fixed in this month’s Patch Tuesday, Microsoft has also republished ten CVE IDs. These are as follows:</p>
<ul data-list-id="94087233" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;,&quot;bgc&quot;:&quot;transparent&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="94087233" data-list-info="{&quot;id&quot;:&quot;94087233&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-9157">CVE-2024-9157</a></p>
</li>
</ul>
<ul data-list-id="49871193" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;,&quot;bgc&quot;:&quot;transparent&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="49871193" data-list-info="{&quot;id&quot;:&quot;49871193&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-1914">CVE-2025-1914</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;,&quot;bgc&quot;:&quot;transparent&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="49871193" data-list-info="{&quot;id&quot;:&quot;49871193&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-1915">CVE-2025-1915</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;,&quot;bgc&quot;:&quot;transparent&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="49871193" data-list-info="{&quot;id&quot;:&quot;49871193&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-1916">CVE-2025-1916</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;,&quot;bgc&quot;:&quot;transparent&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="49871193" data-list-info="{&quot;id&quot;:&quot;49871193&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-1917">CVE-2025-1917</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;,&quot;bgc&quot;:&quot;transparent&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="49871193" data-list-info="{&quot;id&quot;:&quot;49871193&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-1918">CVE-2025-1918</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;,&quot;bgc&quot;:&quot;transparent&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="49871193" data-list-info="{&quot;id&quot;:&quot;49871193&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-1919">CVE-2025-1919</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;,&quot;bgc&quot;:&quot;transparent&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="49871193" data-list-info="{&quot;id&quot;:&quot;49871193&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-1921">CVE-2025-1921</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;,&quot;bgc&quot;:&quot;transparent&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="49871193" data-list-info="{&quot;id&quot;:&quot;49871193&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-1922">CVE-2025-1922</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;size&quot;:13.5,&quot;type&quot;:&quot;text&quot;,&quot;ff&quot;:&quot;zohopuvi&quot;,&quot;bgc&quot;:&quot;transparent&quot;}" data-linerule="auto" data-line-height="1.5" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-list-id="49871193" data-list-info="{&quot;id&quot;:&quot;49871193&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-1923">CVE-2025-1923</a></p>
</li>
</ul>
<p><span data-doc-id="4504799000126085558" data-doc-type="writer">Some third-party vendors such as </span><strong>Broadcom, Cisco, Google, and Ivanti</strong> have also released updates this month.</p>
<h2 class="zw-paragraph heading2" data-header="2" data-margin-bottom="12pt" data-margin-top="14.94pt" data-hd-info="2" data-line-height="1.2" data-doc-id="4504799000126085558" data-doc-type="writer">Best practices to handle patch management in a hybrid work environment<span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_kscyarnx79gx&quot;,&quot;name&quot;:&quot;_Tocg1jodwq137gt&quot;}" data-bookmark-id="toc_kscyarnx79gx"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_kscyarnx79gx&quot;,&quot;name&quot;:&quot;_Tocg1jodwq137gt&quot;}" data-bookmark-id="toc_kscyarnx79gx"> </span></h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Most organizations have opted to embrace remote work even after returning to the office. This decision poses various challenges to IT admins, especially in terms of managing and securing distributed endpoints.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Here are a few pointers to simplify the process of remote patching:</p>
<ul data-list-id="77463950" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="77463950" data-list-info="{&quot;id&quot;:&quot;77463950&quot;,&quot;l&quot;:0}"><strong>Disable automatic updates</strong> because one faulty patch could bring down the whole system. IT admins can educate end users on how to disable automatic updates on their machines. Patch Manager Plus and Endpoint Central also have a <a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html">dedicated</a><a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html"> patch</a>, 105427, that can be deployed to endpoints to ensure that automatic updates are disabled.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="77463950" data-list-info="{&quot;id&quot;:&quot;77463950&quot;,&quot;l&quot;:0}"><strong>Create a restore point</strong>—a backup or image that captures the state of the machines—before deploying big updates like those from Patch Tuesday.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="77463950" data-list-info="{&quot;id&quot;:&quot;77463950&quot;,&quot;l&quot;:0}"><strong>Establish a patching schedule</strong> and keep end users informed about it. It is recommended to set up a time for deploying patches and rebooting systems. Let end users know what needs to be done on their end for trouble-free patching.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="77463950" data-list-info="{&quot;id&quot;:&quot;77463950&quot;,&quot;l&quot;:0}"><strong>Test the patches</strong> on a pilot group of systems before deploying them to the production environment. This will ensure that the patches do not interfere with the workings of other applications.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="77463950" data-list-info="{&quot;id&quot;:&quot;77463950&quot;,&quot;l&quot;:0}">Since many users are working from home, they all might be working different hours; in this case, you can allow end users to <strong>skip</strong> <strong>deployment and scheduled reboots</strong>. This will give them the liberty to install updates at their convenience and avoid disrupting their work. Our patch management products come with options for <a href="https://www.manageengine.com/patch-management/flexible-deployment-policies.html">user-defined deployment and reboot</a>.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="77463950" data-list-info="{&quot;id&quot;:&quot;77463950&quot;,&quot;l&quot;:0}">Most organizations are deploying patches using a VPN. To stop patch tasks from eating up your VPN bandwidth, <strong>install critical patches and security updates first</strong>. You might want to hold off on deploying feature packs and cumulative updates since they are bulky updates and consume a lot of bandwidth.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="77463950" data-list-info="{&quot;id&quot;:&quot;77463950&quot;,&quot;l&quot;:0}"><strong>Schedule the non-security updates and security updates</strong> that are not rated Critical to be deployed after Patch Tuesday, such as during the third or fourth week of the month. You can also choose to <a href="https://www.manageengine.com/patch-management/help/decline-patches.html">decline certain updates</a> if you feel they are not required in your environment.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="77463950" data-list-info="{&quot;id&quot;:&quot;77463950&quot;,&quot;l&quot;:0}"><strong>Run patch reports</strong> to get a detailed view of the health status of your endpoints.</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">For machines belonging to users returning to the office after working remotely, check if they are compliant with your security policies. If not, quarantine them. Install the latest updates and feature packs before deeming your back-to-office machines fit for production. Take inventory of and remove apps that are now obsolete for your back-to-office machines, like remote collaboration software.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">With <a href="https://www.manageengine.com/products/desktop-central/">Endpoint Central</a>, <a href="https://www.manageengine.com/patch-management/">Patch Manager Plus</a>, or <a href="https://www.manageengine.com/vulnerability-management">Vulnerability Manager Plus,</a> you can completely automate the entire process of patch management, from testing patches to deploying them. You can also tailor patch tasks according to your current needs. For a hands-on experience with either of these products, try a free, 30-day trial and keep thousands of applications patched and secure.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Want to learn more about Patch Tuesday updates? Join our experts as they break down this month’s Patch Tuesday updates and offer in-depth analysis. You can also ask our experts questions and get answers to all your Patch Tuesday questions. <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">Register</a> for our free Patch Tuesday webinar.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;13.50&quot;,&quot;fgc&quot;:&quot;rgb(24, 36, 48)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Ready, get set, patch!</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/03/12/march-patch-tuesday-comes-with-fixes-for-57-vulnerabilities-including-7-zero-days.html">March Patch Tuesday comes with fixes for 57 vulnerabilities, including 7 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/03/12/march-patch-tuesday-comes-with-fixes-for-57-vulnerabilities-including-7-zero-days.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>February Patch Tuesday comes with fixes for 55 vulnerabilities, including 4 zero-days</title>
		<link>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/02/12/february-patch-tuesday-comes-with-fixes-for-55-vulnerabilities-including-4-zero-days.html</link>
					<comments>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/02/12/february-patch-tuesday-comes-with-fixes-for-55-vulnerabilities-including-4-zero-days.html#respond</comments>
		
		<dc:creator><![CDATA[Nivedha Venugopalan]]></dc:creator>
		<pubDate>Tue, 11 Feb 2025 19:59:37 +0000</pubDate>
				<category><![CDATA[Patch Manager Plus]]></category>
		<category><![CDATA[February patch Tuesday]]></category>
		<category><![CDATA[Microsoft Patch Tuesday 2025]]></category>
		<category><![CDATA[Microsoft patch Tuesday February]]></category>
		<category><![CDATA[zero day vulnerabilties]]></category>
		<guid isPermaLink="false">https://blogs.manageengine.com/?p=102090</guid>

					<description><![CDATA[<p>Welcome to the second Patch Tuesday of the year; let’s find out what new surprises and challenges await. This month, there are 55 vulnerabilities,  four of...</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/02/12/february-patch-tuesday-comes-with-fixes-for-55-vulnerabilities-including-4-zero-days.html">February Patch Tuesday comes with fixes for 55 vulnerabilities, including 4 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="zw-paragraph heading2" data-header="2" data-margin-bottom="8pt" data-margin-top="12pt" data-hd-info="2" data-line-height="1.2">Welcome to the second Patch Tuesday of the year; let’s find out what new surprises and challenges await. This month, there are 55 vulnerabilities,  four of which are zero-days. This time, two of the zero-days are being actively exploited.<span data-range-char-type="start" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_qq1k950zf25b&quot;,&quot;name&quot;:&quot;_Tocedk4aa1tlvmm&quot;}" data-bookmark-id="toc_qq1k950zf25b"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_qq1k950zf25b&quot;,&quot;name&quot;:&quot;_Tocedk4aa1tlvmm&quot;}" data-bookmark-id="toc_qq1k950zf25b"> </span></p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">After an initial discussion about this month’s updates, we’ll offer our advice for devising a plan to handle patch management in a hybrid work environment. You can also <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">register</a> for our free Patch Tuesday webinar and listen to our experts break down Patch Tuesday updates in detail.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;18.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="14.94pt" data-hd-info="0" data-line-height="1.2">What is Patch Tuesday?<span data-range-char-type="start" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_y77658wfugco&quot;,&quot;name&quot;:&quot;_Toc0ddrjoqqas3p&quot;}" data-bookmark-id="toc_y77658wfugco"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_y77658wfugco&quot;,&quot;name&quot;:&quot;_Toc0ddrjoqqas3p&quot;}" data-bookmark-id="toc_y77658wfugco"> </span></h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Patch Tuesday falls on the second Tuesday of every month. On this day, Microsoft releases security and non-security updates for its operating system and other related applications. Since Microsoft has upheld this process of releasing updates in a periodic manner, IT admins expect these updates and have time to gear up for them.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;18.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="14.94pt" data-hd-info="0" data-line-height="1.2">Why is Patch Tuesday important?<span data-range-char-type="start" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_yh47nb5msruh&quot;,&quot;name&quot;:&quot;_Toc1mxhtbojcu0z&quot;}" data-bookmark-id="toc_yh47nb5msruh"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_yh47nb5msruh&quot;,&quot;name&quot;:&quot;_Toc1mxhtbojcu0z&quot;}" data-bookmark-id="toc_yh47nb5msruh"> </span></h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Important security updates and patches to fix critical bugs or vulnerabilities are released on Patch Tuesday. Usually, zero-day vulnerabilities are also fixed during Patch Tuesday unless the vulnerability is critical and highly exploited, in which case an out-of-band security update is released to address that particular vulnerability.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;18.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="14.94pt" data-hd-info="0" data-line-height="1.2">February 2025 Patch Tuesday<span data-range-char-type="start" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_70brcxhkrhwp&quot;,&quot;name&quot;:&quot;_Toc1ah2p0elj9sa&quot;}" data-bookmark-id="toc_70brcxhkrhwp"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_70brcxhkrhwp&quot;,&quot;name&quot;:&quot;_Toc1ah2p0elj9sa&quot;}" data-bookmark-id="toc_70brcxhkrhwp"> </span></h2>
<h3 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="15.96pt" data-hd-info="0" data-line-height="1.2">Security updates lineup<span data-range-char-type="start" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_401nli60wjpe&quot;,&quot;name&quot;:&quot;_Tocfsohzkdtwz0c&quot;}" data-bookmark-id="toc_401nli60wjpe"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_401nli60wjpe&quot;,&quot;name&quot;:&quot;_Tocfsohzkdtwz0c&quot;}" data-bookmark-id="toc_401nli60wjpe"> </span></h3>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Here is a breakdown of the vulnerabilities fixed this month:</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVE IDs</strong>: 55</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Republished CVE IDs</strong>: 4 (more details on this below)</p>
<h4 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Security updates were released for the following products, features, and roles:</h4>
<ul data-list-id="56625689" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Microsoft Dynamics 365 Sales</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows DHCP Client</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows Message Queuing</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows Resilient File System (ReFS) Deduplication Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows CoreMessaging</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Azure Network Watcher</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows Telephony Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Microsoft Surface</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Microsoft High Performance Compute Pack (HPC) Linux Node Agent</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Visual Studio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows Routing and Remote Access Service (RRAS)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows Internet Connection Sharing (ICS)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Microsoft Edge for iOS and Android</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Outlook for Android</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Microsoft Edge (Chromium-based)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Microsoft PC Manager</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Microsoft Windows</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows Update Stack</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows Remote Desktop Services</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows Kerberos</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Active Directory Domain Services</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Microsoft Office Excel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Microsoft Office</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Microsoft Office SharePoint</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows DWM Core Library</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows Ancillary Function Driver for WinSock</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows Setup Files Cleanup</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Windows Disk Cleanup Tool</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Microsoft AutoUpdate (MAU)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="56625689" data-list-info="{&quot;id&quot;:&quot;56625689&quot;,&quot;l&quot;:0}">Visual Studio Code</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Learn more in the <a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Feb">MSRC’s release notes.</a></p>
<h3 class="zw-paragraph heading3" data-header="3" data-margin-bottom="14.04pt" data-margin-top="14.04pt" data-hd-info="3" data-line-height="1.2">Details of the zero-day vulnerabilities<span data-range-char-type="start" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_jvfwks8s2dox&quot;,&quot;name&quot;:&quot;_Toccxo7p0bq7jkq&quot;}" data-bookmark-id="toc_jvfwks8s2dox"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_jvfwks8s2dox&quot;,&quot;name&quot;:&quot;_Toccxo7p0bq7jkq&quot;}" data-bookmark-id="toc_jvfwks8s2dox"> </span></h3>
<ul data-list-id="82225722" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="82225722" data-list-info="{&quot;id&quot;:&quot;82225722&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-21391">CVE-2025-21391</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component</strong>: Windows Storage</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Elevation of privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS</strong> <strong>3.1</strong>: 7.1</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Microsoft has resolved a security flaw that was being actively exploited, which could allow attackers to gain higher privileges and delete files.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">In its advisory, Microsoft explained that &#8220;The attacker would only be able to remove specific files on a system.&#8221; While this vulnerability doesn&#8217;t expose confidential data, it could result in the deletion of important files, potentially leading to service interruptions, Microsoft noted.</p>
<ul data-list-id="42305909" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="42305909" data-list-info="{&quot;id&quot;:&quot;42305909&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-21418">CVE-2025-21418</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Ancillary Function Driver for WinSock</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Elevation of privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">The second vulnerability that is being actively exploited enables attackers to obtain SYSTEM privileges on Windows. Microsoft has not shared any details on how it was exploited in attacks, and the flaw was reported anonymously.</p>
<ul data-list-id="10098089" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="10098089" data-list-info="{&quot;id&quot;:&quot;10098089&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-21194">CVE-2025-21194</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Microsoft Surface</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Security feature bypass</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.1</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Microsoft has identified a hypervisor vulnerability that allows attackers to bypass UEFI and potentially compromise the secure kernel. According to the advisory, the flaw affects Virtual Machines on UEFI host machines, with some hardware potentially allowing UEFI bypass. This could lead to the hypervisor and secure kernel being compromised.</p>
<ul data-list-id="92610499" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="92610499" data-list-info="{&quot;id&quot;:&quot;92610499&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-21377">CVE-2025-21377</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> NTML Hash Disclosure</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Spoofing</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 6.5</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Microsoft has addressed a publicly disclosed vulnerability that exposes Windows users&#8217; NTLM hashes, potentially allowing attackers to log in as the user remotely.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">The advisory notes, &#8220;Minimal interaction with a malicious file, such as selecting (single-click), inspecting (right-click), or performing any action other than opening or executing the file, could trigger this vulnerability.&#8221;</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Although Microsoft hasn&#8217;t revealed many details, the flaw likely works similarly to other NTLM hash disclosure issues.</p>
<h3 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;18.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-margin-top="14.94pt" data-hd-info="0" data-line-height="1.2">Republished CVE IDs<span data-range-char-type="start" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_ba92uxhmegoj&quot;,&quot;name&quot;:&quot;_Tocs6ive1nxi4ml&quot;}" data-bookmark-id="toc_ba92uxhmegoj"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_ba92uxhmegoj&quot;,&quot;name&quot;:&quot;_Tocs6ive1nxi4ml&quot;}" data-bookmark-id="toc_ba92uxhmegoj"> </span></h3>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Besides the vulnerabilities fixed in this month’s Patch Tuesday, Microsoft has also republished four CVE IDs. These are as follows:</p>
<ul data-list-id="28734336" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-margin-top="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="28734336" data-list-info="{&quot;l&quot;:0,&quot;id&quot;:28734336}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-0444">CVE-2025-0444</a></p>
</li>
</ul>
<ul data-list-id="31893512" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-margin-top="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="31893512" data-list-info="{&quot;l&quot;:0,&quot;id&quot;:31893512}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-32002">CVE-2023-32002</a></p>
</li>
</ul>
<ul data-list-id="67211273" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="67211273" data-list-info="{&quot;id&quot;:&quot;67211273&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-0445">CVE-2025-0445</a></p>
</li>
</ul>
<ul data-list-id="38557834" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="38557834" data-list-info="{&quot;id&quot;:&quot;38557834&quot;,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-0451">CVE-2025-0451</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Some third-party vendors such as <strong>Adobe, Cisco, SAP</strong>, and <strong>Ivanti</strong> have also released updates this month.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;18.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="14.94pt" data-hd-info="0" data-line-height="1.2">Best practices to handle patch management in a hybrid work environment<span data-range-char-type="start" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_6xw41pvm3zlh&quot;,&quot;name&quot;:&quot;_Tocis8c1o9gdx4a&quot;}" data-bookmark-id="toc_6xw41pvm3zlh"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;type&quot;:&quot;bookmark&quot;,&quot;id&quot;:&quot;toc_6xw41pvm3zlh&quot;,&quot;name&quot;:&quot;_Tocis8c1o9gdx4a&quot;}" data-bookmark-id="toc_6xw41pvm3zlh"> </span></h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Most organizations have opted to embrace remote work even after they have been cleared to return to the office. This decision poses various challenges to IT admins, especially in terms of managing and securing distributed endpoints.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Here are a few pointers to simplify the process of remote patching:</p>
<ul data-list-id="37517015" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="37517015" data-list-info="{&quot;id&quot;:&quot;37517015&quot;,&quot;l&quot;:0}"><strong>Disable automatic updates</strong> because one faulty patch could bring down the whole system. IT admins can educate end users on how to disable automatic updates on their machines. Patch Manager Plus and Endpoint Central also have a <a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html">dedicated</a><a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html"> patch</a>, 105427, that can be deployed to endpoints to ensure that automatic updates are disabled.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="37517015" data-list-info="{&quot;id&quot;:&quot;37517015&quot;,&quot;l&quot;:0}"><strong>Create a restore point</strong>—a backup or image that captures the state of the machines—before deploying big updates like those from Patch Tuesday.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="37517015" data-list-info="{&quot;id&quot;:&quot;37517015&quot;,&quot;l&quot;:0}"><strong>Establish a patching schedule</strong> and keep end users informed about it. It is recommended to set up a time for deploying patches and rebooting systems. Let end users know what needs to be done on their end for trouble-free patching.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="37517015" data-list-info="{&quot;id&quot;:&quot;37517015&quot;,&quot;l&quot;:0}"><strong>Test the patches</strong> on a pilot group of systems before deploying them to the production environment. This will ensure that the patches do not interfere with the workings of other applications.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="37517015" data-list-info="{&quot;id&quot;:&quot;37517015&quot;,&quot;l&quot;:0}">Since many users are working from home, they all might be working different hours; in this case, you can allow end users to <strong>skip deployment and scheduled reboots.</strong> This will give them the liberty to install updates at their convenience and avoid disrupting their work. Our patch management products come with options for <a href="https://www.manageengine.com/patch-management/flexible-deployment-policies.html">user-defined deployment and reboot</a>.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="37517015" data-list-info="{&quot;id&quot;:&quot;37517015&quot;,&quot;l&quot;:0}">Most organizations are deploying patches using a VPN. To stop patch tasks from eating up your VPN bandwidth, <strong>install Critical patches and security updates first</strong>. You might want to hold off on deploying feature packs and cumulative updates since they are bulky updates and consume a lot of bandwidth.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="37517015" data-list-info="{&quot;id&quot;:&quot;37517015&quot;,&quot;l&quot;:0}"><strong>Schedule the non-security updates and security updates</strong> that are not rated Critical to be deployed after Patch Tuesday, such as during the third or fourth week of the month. You can also choose to <a href="https://www.manageengine.com/patch-management/help/decline-patches.html">decline certain updates</a> if you feel they are not required in your environment.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-list-id="37517015" data-list-info="{&quot;id&quot;:&quot;37517015&quot;,&quot;l&quot;:0}"><strong>Run patch reports</strong> to get a detailed view of the health status of your endpoints.</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">For machines belonging to users returning to the office after working remotely, check if they are compliant with your security policies. If not, quarantine them. Install the latest updates and feature packs before deeming your back-to-office machines fit for production. Take inventory of and remove apps that are now obsolete for your back-to-office machines, like remote collaboration software.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">With <a href="https://www.manageengine.com/products/desktop-central/">Endpoint Central</a>, <a href="https://www.manageengine.com/patch-management/">Patch Manager Plus</a>, or <a href="https://www.manageengine.com/vulnerability-management">Vulnerability Manager Plus,</a> you can completely automate the entire process of patch management, from testing patches to deploying them. You can also tailor patch tasks according to your current needs. For a hands-on experience with either of these products, try a free, 30-day trial and keep thousands of applications patched and secure.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Want to learn more about Patch Tuesday updates? Join our experts as they break down this month’s Patch Tuesday updates and offer in-depth analysis. You can also ask our experts questions and get answers to all your Patch Tuesday questions. <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">Register</a> for our free Patch Tuesday webinar.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;size&quot;:&quot;12.00&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Ready, get set, patch!</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/02/12/february-patch-tuesday-comes-with-fixes-for-55-vulnerabilities-including-4-zero-days.html">February Patch Tuesday comes with fixes for 55 vulnerabilities, including 4 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/02/12/february-patch-tuesday-comes-with-fixes-for-55-vulnerabilities-including-4-zero-days.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>January 2025 Patch Tuesday comes with fixes for 159 vulnerabilities, including 8 zero-days</title>
		<link>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/01/15/january-2025-patch-tuesday-comes-with-fixes-for-159-vulnerabilities-including-8-zero-days.html</link>
					<comments>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/01/15/january-2025-patch-tuesday-comes-with-fixes-for-159-vulnerabilities-including-8-zero-days.html#comments</comments>
		
		<dc:creator><![CDATA[Anupam Kundu]]></dc:creator>
		<pubDate>Tue, 14 Jan 2025 20:28:49 +0000</pubDate>
				<category><![CDATA[Patch Manager Plus]]></category>
		<category><![CDATA[january patch tuesday]]></category>
		<category><![CDATA[Microsoft Patch Tuesday 2025]]></category>
		<category><![CDATA[Microsoft patch Tuesday January]]></category>
		<guid isPermaLink="false">https://blogs.manageengine.com/?p=101212</guid>

					<description><![CDATA[<p>Welcome to the first Patch Tuesday of the year; let&#8217;s find out what new surprises and challenges await. This month, there are 159 vulnerabilities, eight...</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/01/15/january-2025-patch-tuesday-comes-with-fixes-for-159-vulnerabilities-including-8-zero-days.html">January 2025 Patch Tuesday comes with fixes for 159 vulnerabilities, including 8 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="zw-paragraph heading2" data-header="2" data-margin-bottom="8pt" data-hd-info="2" data-line-height="1.2" data-doc-id="4504799000120499258" data-doc-type="writer">Welcome to the first Patch Tuesday of the year; let&#8217;s find out what new surprises and challenges await. This month, there are 159 vulnerabilities, eight of them zero-days. This time, three of the zero-days are being actively exploited.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">After an initial discussion about this month’s updates, we’ll offer our advice for devising a plan to handle patch management in a hybrid work environment. You can also <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">register</a> for our free Patch Tuesday webinar and listen to our experts break down Patch Tuesday updates in detail.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">What is Patch Tuesday?</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Patch Tuesday falls on the second Tuesday of every month. On this day, Microsoft releases security and non-security updates for its operating system and other related applications. Since Microsoft has upheld this process of releasing updates in a periodic manner, IT admins expect these updates and have time to gear up for them.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Why is Patch Tuesday important?</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Important security updates and patches to fix critical bugs or vulnerabilities are released on Patch Tuesday. Usually, zero-day vulnerabilities are also fixed during Patch Tuesday unless the vulnerability is critical and highly exploited, in which case an out-of-band security update is released to address that particular vulnerability.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">January 2025 Patch Tuesday</h2>
<h3 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Security updates lineup</h3>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here is a breakdown of the vulnerabilities fixed this month:</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVE IDs:</strong> 159</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Republished CVE IDs:</strong> 2 (more details on this below)</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Security updates were released for the following products, features, and roles:</strong></p>
<ul data-list-id="91015995" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">.NET</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">.NET and Visual Studio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">.NET, .NET Framework, Visual Studio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Active Directory Domain Services</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Active Directory Federation Services</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Azure Marketplace SaaS Resources</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">BranchCache</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Internet Explorer</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">IP Helper</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Line Printer Daemon Service (LPD)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft AutoUpdate (MAU)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Azure Gateway Manager</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Brokering File System</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Digest Authentication</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Graphics Component</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Access</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Excel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office OneNote</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Outlook</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Outlook for Mac</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office SharePoint</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Visio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Word</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Purview</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Windows Search Component</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Power Automate</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Reliable Multicast Transport Driver (RMCAST)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Visual Studio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows BitLocker</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Boot Loader</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Boot Manager</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Client-Side Caching (CSC) Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Cloud Files Mini Filter Driver</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows COM</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Connected Devices Platform Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Cryptographic Services</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Digital Media</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Direct Show</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows DWM Core Library</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Event Tracing</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Geolocation Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Hello</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Hyper-V NT Kernel Integration VSP</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Installer</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Kerberos</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Kernel Memory</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows MapUrlToZone</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Message Queuing</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows NTLM</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows OLE</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows PrintWorkflowUserSvc</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Recovery Environment Agent</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Remote Desktop Services</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Secure Boot</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Security Account Manager</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Smart Card</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows SmartScreen</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows SPNEGO Extended Negotiation</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Telephony Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Themes</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows UPnP Device Host</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Virtual Trusted Platform Module</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Virtualization-Based Security (VBS) Enclave</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Web Threat Defense User Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Win32K &#8211; GRFX</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows WLAN Auto Config Service</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Learn more in the <a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Jan">MSRC’s release notes</a>.</p>
<h3 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Details of the zero-day vulnerabilities</h3>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-21333https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-21333">CVE-2025-21333</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-21334">CVE-2025-21334</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-21335">CVE-2025-21335</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Hyper-V NT Kernel Integration VSP</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact</strong>: Elevation of privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">These vulnerabilities allow attackers to execute arbitrary code with elevated privileges on affected systems. Per Microsoft, &#8220;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&#8221;</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;10.50&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">While these vulnerabilities are being actively exploited, these haven&#8217;t been publicly disclosed before.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21186">CVE-2025-21186</a>,  <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21366">CVE-2025-21366</a>, <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21395">CVE-2025-21395</a>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Microsoft Access</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact</strong>: Remote Code Execution</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fgc&quot;:&quot;rgb(0,0,0)&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;url&quot;:&quot;https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49138&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;lnktype&quot;:1,&quot;size&quot;:&quot;12&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2"><span class="EOP"> </span>As of now, the vulnerabilities have been publicly disclosed, but there have been no recorded instances of exploitation. The updates released potentially block certain types of malicious extensions from being sent via email. The extensions are:</p>
<ul data-list-id="25274054" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;10.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="25274054" data-list-info="{&quot;id&quot;:&quot;25274054&quot;,&quot;l&quot;:0}">accdb</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;10.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="25274054" data-list-info="{&quot;id&quot;:&quot;25274054&quot;,&quot;l&quot;:0}">accde</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;10.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="25274054" data-list-info="{&quot;id&quot;:&quot;25274054&quot;,&quot;l&quot;:0}">accdw</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;10.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="25274054" data-list-info="{&quot;id&quot;:&quot;25274054&quot;,&quot;l&quot;:0}">accdt</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;10.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="25274054" data-list-info="{&quot;id&quot;:&quot;25274054&quot;,&quot;l&quot;:0}">accda</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;10.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="25274054" data-list-info="{&quot;id&quot;:&quot;25274054&quot;,&quot;l&quot;:0}">accdr</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;10.50&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="25274054" data-list-info="{&quot;id&quot;:&quot;25274054&quot;,&quot;l&quot;:0}">accdu</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><span class="EOP"> </span></p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21308">CVE-2025-21308</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Themes</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact</strong>: Spoofing</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 6.5</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Microsoft states, &#8220;An attacker would have to convince the user to load a malicious file onto a vulnerable system, typically by way of an enticement in an Email or Instant Messenger message, and then convince the user to manipulate the specially crafted file, but not necessarily click or open the malicious file.&#8221;</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">As for the mitigation, Windows systems that have NTLM disabled in them are not affected by the vulnerability, while the other systems need to block the NTLM hash by applying an existing Group Policy, for which details can be found <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21308">here</a>.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21275">CVE-2025-21275</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows App Package Installer</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact</strong>: Elevation of Privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fgc&quot;:&quot;rgb(0,0,0)&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;url&quot;:&quot;https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49138&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;lnktype&quot;:1,&quot;size&quot;:&quot;12&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;url&quot;:&quot;https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49138&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;lnktype&quot;:1,&quot;size&quot;:&quot;12&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">This vulnerability has also been publicly disclosed, yet no instances of active exploitation have been noted. Microsoft has stated that the attackers can gain SYSTEM privileges by exploiting the vulnerability.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fgc&quot;:&quot;rgb(0,0,0)&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;url&quot;:&quot;https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49138&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;lnktype&quot;:1,&quot;size&quot;:&quot;12&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">Republished CVE IDs</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Besides the vulnerabilities fixed in this month’s Patch Tuesday, Microsoft has also republished two CVE IDs. These are as follows:</p>
<ul data-list-id="33805091" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;lnktype&quot;:1,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;url&quot;:&quot;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-50338&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="33805091" data-list-info="{&quot;id&quot;:33805091,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-50338">CVE-2024-50338</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="33805091" data-list-info="{&quot;id&quot;:33805091,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-7344">CVE-2024-7344</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Some third-party vendors such as <strong>Adobe</strong>, <strong>Cisco</strong>, <strong>SAP</strong>, <strong>Fortinet</strong>, and <strong>Ivanti</strong> have also released updates this January.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations have opted to embrace remote work even after they have been cleared to return to the office. This decision poses various challenges to IT admins, especially in terms of managing and securing distributed endpoints.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here are a few pointers to simplify the process of remote patching:</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Disable automatic updates</strong> because one faulty patch could bring down the whole system. IT admins can educate end users on how to disable automatic updates on their machines. Patch Manager Plus and Endpoint Central also have a <a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html">dedicated</a><a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html"> patch</a>, 105427, that can be deployed to endpoints to ensure that automatic updates are disabled.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Create a restore point</strong>—a backup or image that captures the state of the machines—before deploying big updates like those from Patch Tuesday.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Establish a patching schedule</strong> and keep end users informed about it. It is recommended to set up a time for deploying patches and rebooting systems. Let end users know what needs to be done on their end for trouble-free patching.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Test the patches</strong> on a pilot group of systems before deploying them to the production environment. This will ensure that the patches do not interfere with the workings of other applications.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Since many users are working from home, they all might be working different hours; in this case, you can allow end users to <strong>skip deployment and scheduled reboots</strong>. This will give them the liberty to install updates at their convenience and avoid disrupting their work. Our patch management products come with options for <a href="https://www.manageengine.com/patch-management/flexible-deployment-policies.html">user-defined deployment and reboot</a>.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations are deploying patches using a VPN. To stop patch tasks from eating up your VPN bandwidth, <strong>install Critical patches and security updates first</strong>. You might want to hold off on deploying feature packs and cumulative updates since they are bulky updates and consume a lot of bandwidth.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Schedule the non-security updates and security updates</strong> that are not rated Critical to be deployed after Patch Tuesday, such as during the third or fourth week of the month. You can also choose to <a href="https://www.manageengine.com/patch-management/help/decline-patches.html">decline certain updates</a> if you feel they are not required in your environment.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Run patch reports</strong> to get a detailed view of the health status of your endpoints.</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">For machines belonging to users returning to the office after working remotely, check if they are compliant with your security policies. If not, quarantine them. Install the latest updates and feature packs before deeming your back-to-office machines fit for production. Take inventory of and remove apps that are now obsolete for your back-to-office machines, like remote collaboration software.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">With <a href="https://www.manageengine.com/products/desktop-central/">Endpoint Central</a>, <a href="https://www.manageengine.com/patch-management/">Patch Manager Plus</a>, or <a href="https://www.manageengine.com/vulnerability-management">Vulnerability Manager Plus,</a> you can completely automate the entire process of patch management, from testing patches to deploying them. You can also tailor patch tasks according to your current needs. For a hands-on experience with either of these products, try a free, 30-day trial and keep thousands of applications patched and secure.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Want to learn more about Patch Tuesday updates? Join our experts as they break down this month’s Patch Tuesday updates and offer in-depth analysis. You can also ask our experts questions and get answers to all your Patch Tuesday questions. <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">Register</a> for our free Patch Tuesday webinar.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Ready, get set, patch!</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/01/15/january-2025-patch-tuesday-comes-with-fixes-for-159-vulnerabilities-including-8-zero-days.html">January 2025 Patch Tuesday comes with fixes for 159 vulnerabilities, including 8 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/01/15/january-2025-patch-tuesday-comes-with-fixes-for-159-vulnerabilities-including-8-zero-days.html/feed</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>Notable zero-day vulnerability trends in 2024: Insights and implications</title>
		<link>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/01/08/notable-zero-day-vulnerability-trends-in-2024-insights-and-implications.html</link>
					<comments>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/01/08/notable-zero-day-vulnerability-trends-in-2024-insights-and-implications.html#respond</comments>
		
		<dc:creator><![CDATA[Nivedha Venugopalan]]></dc:creator>
		<pubDate>Wed, 08 Jan 2025 15:00:44 +0000</pubDate>
				<category><![CDATA[Patch Manager Plus]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[critical vulnerabilities]]></category>
		<category><![CDATA[Microsoft zero day]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[zero day exploits]]></category>
		<category><![CDATA[zero day vulnerabilties]]></category>
		<guid isPermaLink="false">https://blogs.manageengine.com/?p=100971</guid>

					<description><![CDATA[<p>2024 has seen a significant uptick in the discovery and exploitation of zero-day vulnerabilities. These unpatched security flaws present a serious challenge to cybersecurity teams,...</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/01/08/notable-zero-day-vulnerability-trends-in-2024-insights-and-implications.html">Notable zero-day vulnerability trends in 2024: Insights and implications</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">2024 has seen a significant uptick in the discovery and exploitation of zero-day vulnerabilities. These unpatched security flaws present a serious challenge to cybersecurity teams, as attackers can exploit them before any patches are available. As a result, zero-day vulnerabilities have become a go-to tool for cybercriminals aiming to infiltrate enterprise networks.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">While all zero-day vulnerabilities demand immediate attention, some are particularly noteworthy because they shed light on which technologies and products are being targeted more frequently by malicious actors. These trends not only highlight critical vulnerabilities but also reveal the evolving tactics and strategies attackers are using to compromise sensitive data and business-critical systems.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">In this post, we’ll dive into the total number of zero-day vulnerabilities discovered in 2024, breaking them down by major vendors, and provide a month-by-month trend graph to track how these vulnerabilities have evolved. We’ll also take a closer look at the top 10 most impactful zero-day vulnerabilities of the year, analyzing their significance, exploitation patterns, and real-world consequences for businesses.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Zero-day vulnerabilities in 2024: Vendor breakdown</strong></h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">The year 2024 saw around 90 zero-day vulnerabilities reported. Here&#8217;s the breakdown of these vulnerabilities by major vendors:</p>
<ul data-list-id="20713234" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="20713234" data-list-info="{&quot;id&quot;:&quot;20713234&quot;,&quot;l&quot;:0}">26 vulnerabilities from Microsoft</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="20713234" data-list-info="{&quot;id&quot;:&quot;20713234&quot;,&quot;l&quot;:0}">10 vulnerabilities from Google</p>
</li>
</ul>
<p class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;none&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;10.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}" data-margin-bottom="12pt" data-line-height="1.2"><span class="EOP"> </span></p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Monthly breakdown of zero-day vulnerabilities</strong></h2>
<p>Here’s how the zero-day vulnerabilities were distributed across the months in 2024:</p>
<p>&nbsp;</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-100990 size-full img-popup" src="https://blogs.manageengine.com/wp-content/uploads/2025/01/graph.png" alt="" width="2736" height="1412" srcset="https://blogs.manageengine.com/wp-content/uploads/2025/01/graph.png 2736w, https://blogs.manageengine.com/wp-content/uploads/2025/01/graph-300x155.png 300w, https://blogs.manageengine.com/wp-content/uploads/2025/01/graph-1024x528.png 1024w, https://blogs.manageengine.com/wp-content/uploads/2025/01/graph-150x77.png 150w, https://blogs.manageengine.com/wp-content/uploads/2025/01/graph-768x396.png 768w, https://blogs.manageengine.com/wp-content/uploads/2025/01/graph-1536x793.png 1536w, https://blogs.manageengine.com/wp-content/uploads/2025/01/graph-2048x1057.png 2048w, https://blogs.manageengine.com/wp-content/uploads/2025/01/graph-1160x599.png 1160w" sizes="(max-width: 2736px) 100vw, 2736px" /></p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2" data-doc-id="4504799000119345717" data-doc-type="writer"><strong>Top 10 zero-day vulnerabilities of 2024</strong></h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Let’s now focus on the top 10 most impactful zero-day vulnerabilities of the year, highlighting the components, CVE IDs, and CVSS scores that have raised the most concerns:</p>
<h4 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>1. Vulnerable component: FortiManager</strong><br class="zw-br" />CVE-ID: CVE-2024-47575<br class="zw-br" />CVSS score: 9.8</h4>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability allowed remote attackers to compromise the affected system due to a lack of authentication in the FortiManager fgfmd daemon. A remote, unauthenticated attacker could send specially crafted requests to the system, executing arbitrary commands and ultimately gaining full control of the system.</p>
<h4 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>2. Vulnerable component: Google Chrome</strong><br class="zw-br" />CVE-ID: CVE-2024-7971<br class="zw-br" />CVSS Score: 9.6</h4>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">A type confusion error within the V8 engine enabled remote attackers to execute arbitrary code on the target system. By crafting a malicious webpage, attackers could deceive the victim into visiting it, triggering the type confusion error and executing arbitrary code.</p>
<h4 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>3. Vulnerable component: Ivanti Cloud Services Appliance </strong><br class="zw-br" />CVE-ID: CVE-2024-8963<br class="zw-br" />CVSS Score: 9.4</h4>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">A directory traversal vulnerability allowed remote attackers to exploit an input validation error when processing directory traversal sequences. An unauthenticated attacker could send a specially crafted HTTP request and read arbitrary files on the system. This vulnerability could also be exploited alongside #VU97119 (CVE-2024-8190) to achieve remote code execution.</p>
<h4 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>4. Vulnerable component: Palo Alto Networks Expedition</strong><br class="zw-br" />CVE-ID: CVE-2024-5910<br class="zw-br" />CVSS Score: 9.3</h4>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">A lack of authentication for a critical function in Palo Alto Networks Expedition allowed attackers with network access to take over the Expedition admin account.</p>
<h4 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>5. Vulnerable component: SQL (Palo Alto Networks Expedition)</strong><br class="zw-br" />CVE-ID: CVE-2024-9465<br class="zw-br" />CVSS Score: 9.2</h4>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">An SQL injection vulnerability in Palo Alto Networks Expedition allowed unauthenticated attackers to expose the Expedition database contents, including sensitive data like password hashes, usernames, device configurations, and API keys. Attackers could also create and read arbitrary files on the system.</p>
<h4 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>6. Vulnerable component: Windows</strong><br class="zw-br" />CVE-ID: CVE-2024-29988<br class="zw-br" />CVSS Score: 8.8</h4>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability allowed a remote attacker to compromise the system by exploiting an insufficient implementation of the Mark of the Web feature. A malicious file within an archive could bypass endpoint detection and response/network detection and response  and Microsoft Windows SmartScreen prompts, enabling the attacker to compromise the system.</p>
<h4 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>7. Vulnerable component: Windows</strong><br class="zw-br" />CVE-ID: CVE-2024-49039<br class="zw-br" />CVSS Score: 8.8</h4>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability allowed a local user to escalate privileges on the system. It stemmed from improper authentication in the Windows Task Scheduler, enabling a local attacker to execute a specially crafted application with elevated privileges.</p>
<h4 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>8. Vulnerable component: Windows</strong><br class="zw-br" />CVE-ID: CVE-2024-30040<br class="zw-br" />CVSS Score: 8.8</h4>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability allowed a remote attacker to compromise the system due to improper input validation in the Windows MSHTML platform. By deceiving the victim into opening or loading a specially crafted file, attackers could bypass Object Linking and Embedding mitigations in Microsoft 365 and Office, executing arbitrary code on the system.</p>
<h4 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>9. Vulnerable component: Google Chromium V8 Engine</strong><br class="zw-br" />CVE-ID: CVE-2024-5274<br class="zw-br" />CVSS Score: 8.8</h4>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">A mismatch in data types led to this vulnerability. Attackers exploited it by providing input that triggered erroneous data interpretation, enabling attacks like arbitrary code execution or unauthorized data access. The impact could range from privilege escalation to data leakage or denial of service, depending on the context.</p>
<h4 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>10. Vulnerable component: .NET and Visual Studio</strong><br class="zw-br" />CVE-ID: CVE-2024-35264<br class="zw-br" />CVSS Score: 8.1</h4>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability had a significant impact on confidentiality, integrity, and availability. It was network-based, meaning an attacker could exploit it remotely without any user interaction, triggering a use-after-free condition to compromise the system.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2"><strong>Protect your organization with comprehensive solutions</strong></h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">In today’s rapidly evolving threat landscape, protecting your organization from zero-day vulnerabilities is crucial. With <a href="https://www.manageengine.com/products/desktop-central/?network=g&amp;device=c&amp;keyword=manageengine%20endpoint%20central&amp;campaignid=19654588997&amp;creative=647688791211&amp;matchtype=p&amp;adposition=&amp;placement=&amp;adgroup=145683667093&amp;targetid=kwd-1683172609861&amp;gad_source=1&amp;gclid=CjwKCAiA1eO7BhATEiwAm0Ee-MsKUY2_4P5IMTrTn28_IgryiNi1XhocmC7xue4QGIRvBNJZpVUPNRoCPvoQAvD_BwE">ManageEngine Endpoint Central</a>, <a href="https://www.manageengine.com/patch-management/index1.html">Patch Manager Plus</a>, and<a href="https://www.manageengine.com/vulnerability-management/"> Vulnerability Manager Plus</a>, you can proactively manage and mitigate these risks before they can be exploited.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">These three solutions help you:</p>
<ul data-list-id="60974624" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="60974624" data-list-info="{&quot;id&quot;:&quot;60974624&quot;,&quot;l&quot;:0}">Ensure timely patching and updates.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="60974624" data-list-info="{&quot;id&quot;:&quot;60974624&quot;,&quot;l&quot;:0}">Identify vulnerabilities in real time.</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="60974624" data-list-info="{&quot;id&quot;:&quot;60974624&quot;,&quot;l&quot;:0}">Minimize the attack surface and reduce the risk of exploitation.</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-margin-top="12pt" data-hd-info="0" data-line-height="1.2">Leverage the power of these tools to safeguard your systems, secure your network, and stay ahead of emerging threats.</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/01/08/notable-zero-day-vulnerability-trends-in-2024-insights-and-implications.html">Notable zero-day vulnerability trends in 2024: Insights and implications</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2025/01/08/notable-zero-day-vulnerability-trends-in-2024-insights-and-implications.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>December 2024 Patch Tuesday comes with fixes for 72 vulnerabilities, including 1 zero-day</title>
		<link>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/12/11/2024-patch-tuesday-comes-with-fixes-for-72-vulnerabilities-including-1-zero-day.html</link>
					<comments>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/12/11/2024-patch-tuesday-comes-with-fixes-for-72-vulnerabilities-including-1-zero-day.html#respond</comments>
		
		<dc:creator><![CDATA[Anupam Kundu]]></dc:creator>
		<pubDate>Tue, 10 Dec 2024 19:40:42 +0000</pubDate>
				<category><![CDATA[Patch Manager Plus]]></category>
		<category><![CDATA[december patch tuesday]]></category>
		<category><![CDATA[Microsoft Patch Tuesday 2024]]></category>
		<category><![CDATA[Microsoft Patch Tuesday December]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://blogs.manageengine.com/?p=100129</guid>

					<description><![CDATA[<p>Here&#8217;s a look at the last Patch Tuesday of the year, which lists fixes for 72 vulnerabilities. This month, a single zero-day vulnerability was fixed,...</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/12/11/2024-patch-tuesday-comes-with-fixes-for-72-vulnerabilities-including-1-zero-day.html">December 2024 Patch Tuesday comes with fixes for 72 vulnerabilities, including 1 zero-day</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-doc-id="4504799000117469778" data-doc-type="writer">Here&#8217;s a look at the last Patch Tuesday of the year, which lists fixes for 72 vulnerabilities. This month, a single zero-day vulnerability was fixed, which is being actively exploited.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">After an initial discussion about this month’s updates, we’ll offer our advice for devising a plan to handle patch management in a hybrid work environment. You can also <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">register</a> for our free Patch Tuesday webinar and listen to our experts break down Patch Tuesday updates in detail.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">What is Patch Tuesday?</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Patch Tuesday falls on the second Tuesday of every month. On this day, Microsoft releases security and non-security updates for its operating system and other related applications. Since Microsoft has upheld this process of releasing updates in a periodic manner, IT admins expect these updates and have time to gear up for them.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Why is Patch Tuesday important?</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Important security updates and patches to fix critical bugs or vulnerabilities are released on Patch Tuesday. Usually, zero-day vulnerabilities are also fixed during Patch Tuesday unless the vulnerability is critical and highly exploited, in which case an out-of-band security update is released to address that particular vulnerability.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-doc-id="4504799000117469778" data-doc-type="writer">December 2024 Patch Tuesday</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Security updates lineup  </strong></p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here is a breakdown of the vulnerabilities fixed this month:</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVE IDs:</strong> 72</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Republished CVE IDs:</strong> 1 (more details on this below)</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Security updates were released for the following products, features, and roles:</strong></p>
<ul data-list-id="91015995" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">System Center Operations Manager</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Edge (Chromium-based)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Defender for Endpoint</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office SharePoint</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">GitHub</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Word</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Excel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Task Scheduler</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Mobile Broadband</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Kernel-Mode Drivers</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Remote Desktop Services</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Virtualization-Based Security (VBS) Enclave</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Publisher</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows IP Routing Management Snapin</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Wireless Wide Area Network Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows File Explorer</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Kernel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Routing and Remote Access Service (RRAS)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Common Log File System Driver</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Role: DNS Server</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Resilient File System (ReFS)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows PrintWorkflowUserSvc</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Message Queuing</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Remote Desktop Client</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">WmsRepair Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows LDAP &#8211; Lightweight Directory Access Protocol</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Cloud Files Mini Filter Driver</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Role: Windows Hyper-V</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Local Security Authority Subsystem Service (LSASS)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Remote Desktop</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Access</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Learn more in the <a href="https://msrc.microsoft.com/update-guide/releaseNote/2024-Dec">MSRC’s release notes</a>.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Details of the zero-day vulnerability</strong></p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-49138">CVE-2024-49138</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Common Log File System Driver</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Elevation of privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">As per Microsoft, this vulnerability has been publicly disclosed and is being actively exploited. Microsoft has also stated that the vulnerability can be exploited to gain SYSTEM privileges. So far, no further information has been reported.</p>
<h3 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">Republished CVE IDs</h3>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Besides the vulnerabilities fixed in this month’s Patch Tuesday, Microsoft has also republished four CVE IDs. These are as follows:</p>
<ul data-list-id="33805091" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="33805091" data-list-info="{&quot;id&quot;:33805091,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-12053">CVE-2024-12053</a></p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Some third-party vendors such as <strong>Adobe</strong>, <strong>Cisco</strong>, <strong>SAP</strong>, and <strong>Veeam</strong> have also released updates this month.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Best practices to handle patch management in a hybrid work environment</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations have opted to embrace remote work even after they have been cleared to return to the office. This decision poses various challenges to IT admins, especially in terms of managing and securing distributed endpoints.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here are a few pointers to simplify the process of remote patching:</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Disable automatic updates</strong> because one faulty patch could bring down the whole system. IT admins can educate end users on how to disable automatic updates on their machines. Patch Manager Plus and Endpoint Central also have a <a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html">dedicated</a><a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html"> patch</a>, 105427, that can be deployed to endpoints to ensure that automatic updates are disabled.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Create a restore point</strong>—a backup or image that captures the state of the machines—before deploying big updates like those from Patch Tuesday.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Establish a patching schedule</strong> and keep end users informed about it. It is recommended to set up a time for deploying patches and rebooting systems. Let end users know what needs to be done on their end for trouble-free patching.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Test the patches</strong> on a pilot group of systems before deploying them to the production environment. This will ensure that the patches do not interfere with the workings of other applications.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Since many users are working from home, they all might be working different hours; in this case, you can allow end users to <strong>skip deployment and scheduled reboots</strong>. This will give them the liberty to install updates at their convenience and avoid disrupting their work. Our patch management products come with options for <a href="https://www.manageengine.com/patch-management/flexible-deployment-policies.html">user-defined deployment and reboot</a>.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations are deploying patches using a VPN. To stop patch tasks from eating up your VPN bandwidth, <strong>install Critical patches and security updates first</strong>. You might want to hold off on deploying feature packs and cumulative updates since they are bulky updates and consume a lot of bandwidth.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Schedule the non-security updates and security updates</strong> that are not rated Critical to be deployed after Patch Tuesday, such as during the third or fourth week of the month. You can also choose to <a href="https://www.manageengine.com/patch-management/help/decline-patches.html">decline certain updates</a> if you feel they are not required in your environment.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Run patch reports</strong> to get a detailed view of the health status of your endpoints.</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">For machines belonging to users returning to the office after working remotely, check if they are compliant with your security policies. If not, quarantine them. Install the latest updates and feature packs before deeming your back-to-office machines fit for production. Take inventory of and remove apps that are now obsolete for your back-to-office machines, like remote collaboration software.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">With <a href="https://www.manageengine.com/products/desktop-central/">Endpoint Central</a>, <a href="https://www.manageengine.com/patch-management/">Patch Manager Plus</a>, or <a href="https://www.manageengine.com/vulnerability-management">Vulnerability Manager Plus,</a> you can completely automate the entire process of patch management, from testing patches to deploying them. You can also tailor patch tasks according to your current needs. For a hands-on experience with either of these products, try a free, 30-day trial and keep thousands of applications patched and secure.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Want to learn more about Patch Tuesday updates? Join our experts as they break down this month’s Patch Tuesday updates and offer in-depth analysis. You can also ask our experts questions and get answers to all your Patch Tuesday questions. <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">Register</a> for our free Patch Tuesday webinar.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Ready, get set, patch!</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/12/11/2024-patch-tuesday-comes-with-fixes-for-72-vulnerabilities-including-1-zero-day.html">December 2024 Patch Tuesday comes with fixes for 72 vulnerabilities, including 1 zero-day</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/12/11/2024-patch-tuesday-comes-with-fixes-for-72-vulnerabilities-including-1-zero-day.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>November 2024 Patch Tuesday comes with fixes for 89 vulnerabilities including 4 zero-days </title>
		<link>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/11/13/november-2024-patch-tuesday-comes-with-fixes-for-89-vulnerabilities-including-4-zero-days.html</link>
					<comments>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/11/13/november-2024-patch-tuesday-comes-with-fixes-for-89-vulnerabilities-including-4-zero-days.html#respond</comments>
		
		<dc:creator><![CDATA[Anupam Kundu]]></dc:creator>
		<pubDate>Wed, 13 Nov 2024 15:34:25 +0000</pubDate>
				<category><![CDATA[Patch Manager Plus]]></category>
		<category><![CDATA[Microsoft Patch Tuesday 2024]]></category>
		<category><![CDATA[Microsoft patch tuesday november]]></category>
		<category><![CDATA[november patch tuesday]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://blogs.manageengine.com/?p=97944</guid>

					<description><![CDATA[<p>Welcome to the Patch Tuesday update for November 2024, which lists fixes for 89 vulnerabilities. This month, there are four zero-day vulnerabilities, of which two...</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/11/13/november-2024-patch-tuesday-comes-with-fixes-for-89-vulnerabilities-including-4-zero-days.html">November 2024 Patch Tuesday comes with fixes for 89 vulnerabilities including 4 zero-days </a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Welcome to the Patch Tuesday update for November 2024, which lists fixes for 89 vulnerabilities. This month, there are four zero-day vulnerabilities, of which two are being actively exploited.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">After an initial discussion about this month’s updates, we’ll offer our advice for devising a plan to handle patch management in a hybrid work environment. You can also <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">register</a> for our free Patch Tuesday webinar and listen to our experts break down Patch Tuesday updates in detail.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">What is Patch Tuesday?</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Patch Tuesday falls on the second Tuesday of every month. On this day, Microsoft releases security and non-security updates for its operating system and other related applications. Since Microsoft has upheld this process of releasing updates in a periodic manner, IT admins expect these updates and have time to gear up for them.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Why is Patch Tuesday important?</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Important security updates and patches to fix critical bugs or vulnerabilities are released on Patch Tuesday. Usually, zero-day vulnerabilities are also fixed during Patch Tuesday unless the vulnerability is critical and highly exploited, in which case an out-of-band security update is released to address that particular vulnerability.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">November 2024 Patch Tuesday</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Security updates lineup  </strong></p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here is a breakdown of the vulnerabilities fixed this month:</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVE IDs:</strong> 89</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Republished CVE IDs:</strong> 3 (more details on this below)</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Security updates were released for the following products, features, and roles:</strong></p>
<ul data-list-id="91015995" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Package Library Manager</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">SQL Server</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Virtual Hard Drive</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows SMBv3 Client/Server</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows USB Video Driver</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Windows DNS</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows NTLM</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Registry</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">.NET and Visual Studio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Update Stack</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">LightGBM</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Azure CycleCloud</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Azure Database for PostgreSQL</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Telephony Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows NT OS Kernel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Role: Windows Hyper-V</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows VMSwitch</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows DWM Core Library</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Kernel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Secure Kernel Mode</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Kerberos</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows SMB</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows CSC Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Defender Application Control (WDAC)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Active Directory Certificate Services</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Excel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Graphics Component</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Word</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Task Scheduler</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Exchange Server</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Visual Studio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Win32 Kernel Subsystem</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">TorchGeo</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Visual Studio Code</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft PC Manager</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Airlift.microsoft.com</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><span class="EOP"> </span>Learn more in the <a href="https://msrc.microsoft.com/update-guide/releaseNote/2024-Nov">MSRC’s release notes</a>.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Details of the zero-day vulnerabilities</h2>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-43451">CVE-2024-43451</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows NTLM</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Spoofing</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 6.5</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">This critical zero-day vulnerability enables attackers to capture a user&#8217;s NTLMv2 hash with minimal user interaction. This presents a security risk as it could allow unauthorized access to network resources. By simply selecting or right-clicking a malicious file, users may expose their NTLMv2 hash which could be used by an attacker to exploit for unauthorized authentication.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">Speaking of the mitigation, Microsoft has issued an essential security patch to address this flaw, and users are strongly prompted to apply the latest patches/updates immediately. Enterprises and organizations should also educate the end users on the risks of interacting with unsolicited files.<span class="EOP"> </span></p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">This vulnerability has been <strong>publicly disclosed</strong> and is being <strong>actively exploited</strong>.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2"><span class="EOP"> </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49039">CVE-2024-49039</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Task Scheduler</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Elevation of Privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1</strong>: 8.8</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">This zero-day vulnerability allows attackers to execute unauthorized code or gain access to resources at a higher privilege level than what’s typically allowed in a low-privilege AppContainer environment.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">Threat actors can exploit this vulnerability to escalate privileges, permitting them to perform Remote Procedure Call functions which are normally restricted to privileged accounts and affect the Windows systems that rely on Task Scheduler.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability is being <strong>actively exploited</strong>.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49040">CVE-2024-49040</a></li>
</ul>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Vulnerable component:</strong> Microsoft Exchange Server</p>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Impact:</strong> Spoofing</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.5</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">While Microsoft is aware of this vulnerability, much has not yet been released in the MSRC blog. However, they have released <a href="https://learn.microsoft.com/en-us/Exchange/plan-and-deploy/post-installation-tasks/security-best-practices/exchange-non-compliant-p2from-detection">additional information</a> about the steps to be performed or actions to be taken after the update.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability has been <strong>publicly disclosed</strong>.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49019">CVE-2024-49019</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component: </strong>Windows Active Directory Certificate Services</p>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Impact:</strong> Elevation of privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">This zero-day is commonly referred to as ESC15 or &#8220;EKUwu.&#8221; By leveraging this vulnerability, attackers can exploit misconfigurations within certificate templates. This would potentially lead to unauthorized access and privilege escalation in the affected systems. By manipulating the Enhanced Key Usage (EKU) extensions, threat actors can also obtain certificates, providing them with elevated privileges.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability has been <strong>publicly disclosed</strong>.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Third-party updates released after last month’s Patch Tuesday</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Some third-party vendors such as <strong>Adobe</strong>, <strong>Cisco</strong>, <strong>Citrix</strong>, <strong>Dell</strong>, <strong>Siemens</strong>, <strong>SAP</strong> and <strong>Ivanti</strong> have also released updates this November.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Republished CVE IDs</strong></p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Besides the vulnerabilities fixed in this month’s Patch Tuesday, Microsoft has also republished four CVE IDs. These are as follows:</p>
<ul data-list-id="33805091" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="33805091" data-list-info="{&quot;id&quot;:33805091,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-10826">CVE-2024-10826</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="33805091" data-list-info="{&quot;id&quot;:33805091,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-10827">CVE-2024-10827</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="33805091" data-list-info="{&quot;id&quot;:33805091,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-5535">CVE-2024-5535</a></p>
</li>
</ul>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Best practices to handle patch management in a hybrid work environment</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations have opted to embrace remote work even after they have been cleared to return to the office. This decision poses various challenges to IT admins, especially in terms of managing and securing distributed endpoints.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here are a few pointers to simplify the process of remote patching:</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Disable automatic updates</strong> because one faulty patch could bring down the whole system. IT admins can educate end users on how to disable automatic updates on their machines. Patch Manager Plus and Endpoint Central also have a <a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html">dedicated</a><a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html"> patch</a>, 105427, that can be deployed to endpoints to ensure that automatic updates are disabled.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Create a restore point</strong>—a backup or image that captures the state of the machines—before deploying big updates like those from Patch Tuesday.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Establish a patching schedule</strong> and keep end users informed about it. It is recommended to set up a time for deploying patches and rebooting systems. Let end users know what needs to be done on their end for trouble-free patching.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Test the patches</strong> on a pilot group of systems before deploying them to the production environment. This will ensure that the patches do not interfere with the workings of other applications.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Since many users are working from home, they all might be working different hours; in this case, you can allow end users to <strong>skip deployment and scheduled reboots</strong>. This will give them the liberty to install updates at their convenience and avoid disrupting their work. Our patch management products come with options for <a href="https://www.manageengine.com/patch-management/flexible-deployment-policies.html">user-defined deployment and reboot</a>.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations are deploying patches using a VPN. To stop patch tasks from eating up your VPN bandwidth, <strong>install Critical patches and security updates first</strong>. You might want to hold off on deploying feature packs and cumulative updates since they are bulky updates and consume a lot of bandwidth.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Schedule the non-security updates and security updates</strong> that are not rated Critical to be deployed after Patch Tuesday, such as during the third or fourth week of the month. You can also choose to <a href="https://www.manageengine.com/patch-management/help/decline-patches.html">decline certain updates</a> if you feel they are not required in your environment.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Run patch reports</strong> to get a detailed view of the health status of your endpoints.</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">For machines belonging to users returning to the office after working remotely, check if they are compliant with your security policies. If not, quarantine them. Install the latest updates and feature packs before deeming your back-to-office machines fit for production. Take inventory of and remove apps that are now obsolete for your back-to-office machines, like remote collaboration software.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">With <a href="https://www.manageengine.com/products/desktop-central/">Endpoint Central</a>, <a href="https://www.manageengine.com/patch-management/">Patch Manager Plus</a>, or <a href="https://www.manageengine.com/vulnerability-management">Vulnerability Manager Plus,</a> you can completely automate the entire process of patch management, from testing patches to deploying them. You can also tailor patch tasks according to your current needs. For a hands-on experience with either of these products, try a free, 30-day trial and keep thousands of applications patched and secure.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Want to learn more about Patch Tuesday updates? Join our experts as they break down this month’s Patch Tuesday updates and offer in-depth analysis. You can also ask our experts questions and get answers to all your Patch Tuesday questions. <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">Register</a> for our free Patch Tuesday webinar.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Ready, get set, patch!</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/11/13/november-2024-patch-tuesday-comes-with-fixes-for-89-vulnerabilities-including-4-zero-days.html">November 2024 Patch Tuesday comes with fixes for 89 vulnerabilities including 4 zero-days </a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/11/13/november-2024-patch-tuesday-comes-with-fixes-for-89-vulnerabilities-including-4-zero-days.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>October 2024 Patch Tuesday comes with fixes for 117 vulnerabilities including 5 zero-days</title>
		<link>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/10/09/october-2024-patch-tuesday-comes-with-fixes-for-118-vulnerabilities-including-5-zero-days.html</link>
					<comments>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/10/09/october-2024-patch-tuesday-comes-with-fixes-for-118-vulnerabilities-including-5-zero-days.html#respond</comments>
		
		<dc:creator><![CDATA[Anupam Kundu]]></dc:creator>
		<pubDate>Tue, 08 Oct 2024 19:41:25 +0000</pubDate>
				<category><![CDATA[Patch Manager Plus]]></category>
		<category><![CDATA[Microsoft Patch Tuesday 2024]]></category>
		<category><![CDATA[Microsoft patch tuesday october]]></category>
		<category><![CDATA[October patch tuesday]]></category>
		<category><![CDATA[zero-day vulnerabilities]]></category>
		<guid isPermaLink="false">https://blogs.manageengine.com/?p=96875</guid>

					<description><![CDATA[<p>Edit (Oct. 9, 2024): The total number of vulnerabilities fixed in this Patch Tuesday is 117. Welcome to the Patch Tuesday update for October 2024,...</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/10/09/october-2024-patch-tuesday-comes-with-fixes-for-118-vulnerabilities-including-5-zero-days.html">October 2024 Patch Tuesday comes with fixes for 117 vulnerabilities including 5 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.manageengine.com/products/desktop-central/national-cybersecurity-awareness-month-2024.html#1" target="_blank" rel="noopener"><img decoding="async" class="aligncenter wp-image-96880 size-full img-popup" src="https://blogs.manageengine.com/wp-content/uploads/2024/10/NCSAM3_970x90.png" alt="National Cybersecurity Awareness Month 2024 banner by ManageEngine" width="970" height="90" srcset="https://blogs.manageengine.com/wp-content/uploads/2024/10/NCSAM3_970x90.png 970w, https://blogs.manageengine.com/wp-content/uploads/2024/10/NCSAM3_970x90-300x28.png 300w, https://blogs.manageengine.com/wp-content/uploads/2024/10/NCSAM3_970x90-150x14.png 150w, https://blogs.manageengine.com/wp-content/uploads/2024/10/NCSAM3_970x90-768x71.png 768w" sizes="(max-width: 970px) 100vw, 970px" /></a></p>
<p data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-doc-id="4504799000111521521" data-doc-type="writer"><em><strong>Edit (Oct. 9, 2024):</strong></em> <em>The total number of vulnerabilities fixed in this Patch Tuesday is 117.</em></p>
<p data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-doc-id="4504799000111521521" data-doc-type="writer">Welcome to the Patch Tuesday update for October 2024, which lists fixes for<strong> 117 vulnerabilities</strong>. This month, there are five zero-day vulnerabilities, of which two are being actively exploited, while all five have been publicly disclosed.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">After an initial discussion about this month’s updates, we’ll offer our advice for devising a plan to handle patch management in a hybrid work environment. You can also <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">register</a> for our free Patch Tuesday webinar and listen to our experts break down Patch Tuesday updates in detail.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">What is Patch Tuesday?</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Patch Tuesday falls on the second Tuesday of every month. On this day, Microsoft releases security and non-security updates for its operating system and other related applications. Since Microsoft has upheld this process of releasing updates in a periodic manner, IT admins expect these updates and have time to gear up for them.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Why is Patch Tuesday important?</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Important security updates and patches to fix critical bugs or vulnerabilities are released on Patch Tuesday. Usually, zero-day vulnerabilities are also fixed during Patch Tuesday unless the vulnerability is critical and highly exploited, in which case an out-of-band security update is released to address that particular vulnerability.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">October 2024 Patch Tuesday</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Security updates lineup  </strong></p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here is a breakdown of the vulnerabilities fixed this month:</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVE IDs:</strong> 117</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Republished CVE IDs:</strong> 4 (more details on this below)</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Security updates were released for the following products, features, and roles:</strong></p>
<ul data-list-id="91015995" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Role: Windows Hyper-V</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Hyper-V</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows EFI Partition</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Kernel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">OpenSSH for Windows</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Azure Monitor</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Netlogon</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Kerberos</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">BranchCache</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Azure Stack</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Routing and Remote Access Service (RRAS)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">.NET and Visual Studio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Remote Desktop Licensing Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Remote Desktop Services</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Configuration Manager</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Service Fabric</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Power BI</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">.NET, .NET Framework, Visual Studio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Visual Studio Code</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">DeepSpeed</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Resilient File System (ReFS)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Common Log File System Driver</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office SharePoint</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Excel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office Visio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Graphics Component</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Standards-Based Storage Management Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows BitLocker</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows NTFS</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Internet Small Computer Systems Interface (iSCSI)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Secure Kernel Mode</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft ActiveX</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Telephony Server</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft WDAC OLE DB provider for SQL</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Local Security Authority (LSA)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Mobile Broadband</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Print Spooler Components</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">RPC Endpoint Mapper Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Remote Desktop Client</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Kernel-Mode Drivers</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Simple Certificate Enrollment Protocol</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Online Certificate Status Protocol (OCSP)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Cryptographic Services</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Secure Channel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Storage</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Shell</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows NT OS Kernel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Storage Port Driver</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Network Address Translation (NAT)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Ancillary Function Driver for WinSock</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Sudo for Windows</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Management Console</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows MSHTML Platform</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Windows Speech</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Office</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Remote Desktop</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Winlogon</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Windows Scripting</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Code Integrity Guard</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Visual C++ Redistributable Installer</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Azure CLI</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Visual Studio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Outlook for Android</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="91015995" data-list-info="{&quot;id&quot;:&quot;91015995&quot;,&quot;l&quot;:0}">Microsoft Defender for Endpoint</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><span class="EOP"> </span>Learn more in the <a href="https://msrc.microsoft.com/update-guide/releaseNote/2024-Oct">MSRC’s release notes</a>.</p>
<p><a href="http://www.manageengine.com/products/desktop-central/national-cybersecurity-awareness-month-2024.html?pt_blog_middle" target="_blank" rel="noopener"><img decoding="async" class="aligncenter wp-image-96880 size-full img-popup" src="https://blogs.manageengine.com/wp-content/uploads/2024/10/NCSAM3_970x90.png" alt="National Cybersecurity Awareness Month 2024 banner by ManageEngine" width="970" height="90" srcset="https://blogs.manageengine.com/wp-content/uploads/2024/10/NCSAM3_970x90.png 970w, https://blogs.manageengine.com/wp-content/uploads/2024/10/NCSAM3_970x90-300x28.png 300w, https://blogs.manageengine.com/wp-content/uploads/2024/10/NCSAM3_970x90-150x14.png 150w, https://blogs.manageengine.com/wp-content/uploads/2024/10/NCSAM3_970x90-768x71.png 768w" sizes="(max-width: 970px) 100vw, 970px" /></a></p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Details of the zero-day vulnerabilities</h2>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-43572" target="_blank" rel="noopener">CVE-2024-43572</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Microsoft Management Console</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Remote code execution</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">The score of this vulnerability indicates that it can be exploited locally and requires user intervention. This implies that the attack can be carried out by social engineering attacks and the threat actor can exploit it remotely as well.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">Microsoft states, &#8220;The security update will prevent untrusted Microsoft Saved Console (MSC) files from being opened to protect customers against the risks associated with this vulnerability.&#8221;</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">This vulnerability has been <strong>publicly disclosed</strong> and is being <strong>actively exploited</strong>.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-43573" target="_blank" rel="noopener">CVE-2024-43573</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component: </strong>Windows MSHTML Platform</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Spoofing</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 6.5</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">As per Microsoft, while Internet Explorer 11 and the old version of Edge have been phased out, certain underlying technologies like MSHTML and EdgeHTML are still used by older applications, including Internet Explorer mode in the new Microsoft Edge. These technologies are crucial for running legacy apps, and they require ongoing updates to stay secure.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">For users of Windows Server 2008, 2008 R2, and 2012, specific updates related to newer platforms may not apply. However, Microsoft recommends users who install the Security Only updates to install the IE Cumulative updates for this vulnerability.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability has been <strong>publicly disclosed</strong> and is being <strong>actively exploited</strong>.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-20659" target="_blank" rel="noopener">CVE-2024-20659</a></li>
</ul>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Hyper-V<br class="zw-br" /><strong><br />
Impact:</strong> Security feature bypass</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.1</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">For this vulnerability to be exploited successfully, the attacker first needs to gain access to the restricted network and then make the user boot their system.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">The MSRC states, &#8220;This Hypervisor vulnerability relates to Virtual Machines within a Unified Extensible Firmware Interface (UEFI) host machine. On some specific hardware it might be possible to bypass the UEFI, which could lead to the compromise of the hypervisor and the secure kernel.&#8221;</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability has been <strong>publicly disclosed</strong>.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-43583" target="_blank" rel="noopener">CVE-2024-43583</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Winlogon (Windows Logon)</p>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Impact:</strong> Elevation of privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Microsoft states, &#8220;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&#8221; It is recommended to enable a Microsoft third-party IME on the devices to address this vulnerability. <a href="https://prod.support.services.microsoft.com/en-us/topic/kb5046254-vulnerability-when-using-a-third-party-input-method-editor-at-the-microsoft-windows-sign-in-screen-cbcec9d7-586b-4252-a40d-b7a584c4c005">Learn how</a> to enable a Microsoft third-party IME.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability has been <strong>publicly disclosed</strong>.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-6197" target="_blank" rel="noopener">CVE-2024-6197</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Open Source Curl</p>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Impact:</strong> Remote code execution</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 8.8</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Microsoft states that this attack requires a client to connect to a malicious server, which could allow the attacker to gain code execution privileges on the client. To learn more about the vulnerability, you can refer to the <a href="https://curl.se/docs/CVE-2024-6197.html">official advisory by Curl</a>.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability has been <strong>publicly disclosed</strong>.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Third-party updates released after last month’s Patch Tuesday</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Some third-party vendors such as <strong>Fortinet</strong>, <strong>Cisco</strong>, <strong>Qualcomm</strong>, and <strong>Ivanti</strong> have also released updates this October.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Republished CVE IDs</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Besides the vulnerabilities fixed in this month’s Patch Tuesday, Microsoft has also republished four CVE IDs. These are as follows:</p>
<ul data-list-id="33805091" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="33805091" data-list-info="{&quot;id&quot;:33805091,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-6197" target="_blank" rel="noopener">CVE-2024-6197</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="33805091" data-list-info="{&quot;id&quot;:33805091,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-7025" target="_blank" rel="noopener">CVE-2024-7025</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="33805091" data-list-info="{&quot;id&quot;:33805091,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-9369" target="_blank" rel="noopener">CVE-2024-9369</a></p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="33805091" data-list-info="{&quot;id&quot;:33805091,&quot;l&quot;:0}"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-9370" target="_blank" rel="noopener">CVE-2024-9370</a></p>
</li>
</ul>
<h2 class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Best practices to handle patch management in a hybrid work environment</h2>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations have opted to embrace remote work even after they have been cleared to return to the office. This decision poses various challenges to IT admins, especially in terms of managing and securing distributed endpoints.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here are a few pointers to simplify the process of remote patching:</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Disable automatic updates</strong> because one faulty patch could bring down the whole system. IT admins can educate end users on how to disable automatic updates on their machines. Patch Manager Plus and Endpoint Central also have a <a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html">dedicated</a><a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html"> patch</a>, 105427, that can be deployed to endpoints to ensure that automatic updates are disabled.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Create a restore point</strong>—a backup or image that captures the state of the machines—before deploying big updates like those from Patch Tuesday.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Establish a patching schedule</strong> and keep end users informed about it. It is recommended to set up a time for deploying patches and rebooting systems. Let end users know what needs to be done on their end for trouble-free patching.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Test the patches</strong> on a pilot group of systems before deploying them to the production environment. This will ensure that the patches do not interfere with the workings of other applications.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Since many users are working from home, they all might be working different hours; in this case, you can allow end users to <strong>skip deployment and scheduled reboots</strong>. This will give them the liberty to install updates at their convenience and avoid disrupting their work. Our patch management products come with options for <a href="https://www.manageengine.com/patch-management/flexible-deployment-policies.html">user-defined deployment and reboot</a>.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations are deploying patches using a VPN. To stop patch tasks from eating up your VPN bandwidth, <strong>install Critical patches and security updates first</strong>. You might want to hold off on deploying feature packs and cumulative updates since they are bulky updates and consume a lot of bandwidth.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Schedule the non-security updates and security updates</strong> that are not rated Critical to be deployed after Patch Tuesday, such as during the third or fourth week of the month. You can also choose to <a href="https://www.manageengine.com/patch-management/help/decline-patches.html">decline certain updates</a> if you feel they are not required in your environment.</li>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Run patch reports</strong> to get a detailed view of the health status of your endpoints.</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">For machines belonging to users returning to the office after working remotely, check if they are compliant with your security policies. If not, quarantine them. Install the latest updates and feature packs before deeming your back-to-office machines fit for production. Take inventory of and remove apps that are now obsolete for your back-to-office machines, like remote collaboration software.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">With <a href="https://www.manageengine.com/products/desktop-central/">Endpoint Central</a>, <a href="https://www.manageengine.com/patch-management/">Patch Manager Plus</a>, or <a href="https://www.manageengine.com/vulnerability-management">Vulnerability Manager Plus,</a> you can completely automate the entire process of patch management, from testing patches to deploying them. You can also tailor patch tasks according to your current needs. For a hands-on experience with either of these products, try a free, 30-day trial and keep thousands of applications patched and secure.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Want to learn more about Patch Tuesday updates? Join our experts as they break down this month’s Patch Tuesday updates and offer in-depth analysis. You can also ask our experts questions and get answers to all your Patch Tuesday questions. <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_blog">Register</a> for our free Patch Tuesday webinar.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Ready, get set, patch!</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><span class="EOP"> </span></p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/10/09/october-2024-patch-tuesday-comes-with-fixes-for-118-vulnerabilities-including-5-zero-days.html">October 2024 Patch Tuesday comes with fixes for 117 vulnerabilities including 5 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/10/09/october-2024-patch-tuesday-comes-with-fixes-for-118-vulnerabilities-including-5-zero-days.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>September 2024 Patch Tuesday comes with fixes for 79 vulnerabilities including 4 zero-days</title>
		<link>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/09/11/september-2024-patch-tuesday-comes-with-fixes-for-79-vulnerabilities-including-4-zero-days.html</link>
					<comments>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/09/11/september-2024-patch-tuesday-comes-with-fixes-for-79-vulnerabilities-including-4-zero-days.html#respond</comments>
		
		<dc:creator><![CDATA[Anupam Kundu]]></dc:creator>
		<pubDate>Tue, 10 Sep 2024 19:43:01 +0000</pubDate>
				<category><![CDATA[Patch Manager Plus]]></category>
		<category><![CDATA[Microsoft Patch Tuesday 2024]]></category>
		<category><![CDATA[microsoft patch tuesday september]]></category>
		<category><![CDATA[september patch tuesday]]></category>
		<guid isPermaLink="false">https://blogs.manageengine.com/?p=95970</guid>

					<description><![CDATA[<p>Welcome to the Patch Tuesday update for September 2024, which lists fixes for 79 vulnerabilities. This month, there are a total of four zero-day vulnerabilities...</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/09/11/september-2024-patch-tuesday-comes-with-fixes-for-79-vulnerabilities-including-4-zero-days.html">September 2024 Patch Tuesday comes with fixes for 79 vulnerabilities including 4 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-doc-id="4504799000108902804" data-doc-type="writer">Welcome to the Patch Tuesday update for September 2024, which lists fixes for 79 vulnerabilities. This month, there are a total of four zero-day vulnerabilities that are being actively exploited, one of which is being publicly disclosed.</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">After an initial discussion about this month’s updates, we’ll offer our advice for devising a plan to handle patch management in a hybrid work environment. You can also <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_sep24blog">register</a> for our free Patch Tuesday webinar and listen to our experts break down Patch Tuesday updates in detail.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">What is Patch Tuesday?</h2>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Patch Tuesday falls on the second Tuesday of every month. On this day, Microsoft releases security and non-security updates for its operating system and other related applications. Since Microsoft has upheld this process of releasing updates in a periodic manner, IT admins expect these updates and have time to gear up for them.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Why is Patch Tuesday important?</h2>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Important security updates and patches to fix critical bugs or vulnerabilities are released on Patch Tuesday. Usually, zero-day vulnerabilities are also fixed during Patch Tuesday unless the vulnerability is critical and highly exploited, in which case an out-of-band security update is released to address that particular vulnerability.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">September 2024 Patch Tuesday</h2>
<h3 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Security updates lineup</h3>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here is a breakdown of the vulnerabilities fixed this month:</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVE IDs:</strong> 79</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Security updates were released for the following products, features, and roles:</p>
<ul data-list-id="87846258" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows TCP/IP</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">SQL Server</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Security Zone Mapping</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Installer</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Office SharePoint</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows PowerShell</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Network Address Translation (NAT)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Azure Network Watcher</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Azure Web Apps</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Azure Stack</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Mark of the Web (MOTW)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Dynamics Business Central</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Office Publisher</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Standards-Based Storage Management Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Remote Desktop Licensing Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Network Virtualization</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Role: Windows Hyper-V</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows DHCP Server</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Streaming Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Kerberos</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Remote Access Connection Manager</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Win32K &#8211; GRFX</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Graphics Component</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Storage</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Win32K &#8211; ICOMP</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Authentication Methods</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Kernel-Mode Drivers</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows AllJoyn API</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Management Console</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Setup and Deployment</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows MSHTML Platform</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Office Visio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Office Excel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Azure CycleCloud</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Admin Center</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Dynamics 365 (on-premises)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Power Automate</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Outlook for iOS</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Update</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft AutoUpdate (MAU)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Libarchive</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-margin-left="0in" data-text-indent="0in" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><span class="EOP"> </span>Learn more in the <a href="https://msrc.microsoft.com/update-guide/releaseNote/2024-Sep">MSRC’s release notes</a>.</p>
<h3 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Details of the zero-day vulnerabilities</h3>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38217">CVE-2024-38217</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Mark of the Web (MOTW)</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Security feature bypass</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 5.4</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">This vulnerability allows attackers to exploit the Mark of the Web (MOTW) feature by hosting a malicious file on an attacker-controlled server and tricking a user into downloading and opening it.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">Upon a successful exploitation, the attacker could bypass security measures like SmartScreen and Windows Attachment Services, leading to a limited loss of integrity and availability.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2">This vulnerability has been publicly disclosed and is being actively exploited.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2"><span class="EOP"> </span><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38226">CVE-2024-38226</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Microsoft Publisher</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Security feature bypass</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.3</p>
<p class="zw-paragraph" data-margin-bottom="12pt" data-line-height="1.2">This vulnerability allows attackers to bypass Office macro policies designed to block untrusted or malicious files. To exploit the vulnerability, the attacker needs to convince the user to download a specially crafted file via social engineering. Microsoft has also stated that the Preview Pane is not an attack vector.</p>
<p class="zw-paragraph" data-textformat="{&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-line-height="1.2">While it has not yet been publicly disclosed, the vulnerability is being actively exploited.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38014">CVE-2024-38014</a></li>
</ul>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Installer</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Elevation of privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph" data-margin-bottom="12pt" data-line-height="1.2">Microsoft states that an attacker can gain SYSTEM privileges on successful exploitation of the vulnerability.</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">This vulnerability has not yet been publicly disclosed but is being actively exploited.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-43491">CVE-2024-43491</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Microsoft Windows Update</p>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Impact:</strong> Remote Code Execution Vulnerability<span data-range-char-type="start" data-bookmark-info="{&quot;name&quot;:&quot;_Tocbjcplp5o53hz&quot;,&quot;id&quot;:&quot;toc_ir2surva9bb6&quot;,&quot;type&quot;:&quot;bookmark&quot;,&quot;render_type&quot;:&quot;inline&quot;,&quot;geo_transformation&quot;:{&quot;translation&quot;:{&quot;x&quot;:false,&quot;y&quot;:false},&quot;scaling&quot;:{&quot;x&quot;:false,&quot;y&quot;:false},&quot;rotation&quot;:false}}" data-bookmark-id="toc_ir2surva9bb6"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;name&quot;:&quot;_Tocbjcplp5o53hz&quot;,&quot;id&quot;:&quot;toc_ir2surva9bb6&quot;,&quot;type&quot;:&quot;bookmark&quot;}" data-bookmark-id="toc_ir2surva9bb6"> </span></p>
<p class="zw-paragraph" data-textformat="{}" data-margin-bottom="12pt" data-line-height="1.2"><strong>CVSS 3.1:</strong> 9.8</p>
<p class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="12pt" data-line-height="1.2">This Servicing Stack vulnerability has been actively exploited and has been marked as Critical.</p>
<p class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="12pt" data-line-height="1.2">Per Microsoft, &#8220;Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015). This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have installed the Windows security update released on March 12, 2024—KB5035858 (OS Build 10240.20526) or other updates released until August 2024. All later versions of Windows 10 are not impacted by this vulnerability.&#8221;</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">If you would like to know more on the precautions and actions needed to be taken to restore the fixes rolled back by the vulnerability, you can refer to the <a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-43491">MSRC blog</a>.</p>
<h3 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Third-party updates released after last month’s Patch Tuesday</h3>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Third-party vendors such as <strong>Fortinet</strong>, <strong>Cisco</strong>, <strong>Google</strong>, <strong>Apache</strong>, and <strong>Ivanti</strong> have also released updates this September.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Best practices to handle patch management in a hybrid work environment</h2>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations have opted to embrace remote work even after they have been cleared to return to the office. This decision poses various challenges to IT admins, especially in terms of managing and securing distributed endpoints.</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here are a few pointers to simplify the process of remote patching:</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Disable automatic updates</strong> because one faulty patch could bring down the whole system. IT admins can educate end users on how to disable automatic updates on their machines. Patch Manager Plus and Endpoint Central also have a <a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html">dedicated</a><a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html"> patch</a>, 105427, that can be deployed to endpoints to ensure that automatic updates are disabled.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Create a restore point</strong>—a backup or image that captures the state of the machines—before deploying big updates like those from Patch Tuesday.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Establish a patching schedule</strong> and keep end users informed about it. It is recommended to set up a time for deploying patches and rebooting systems. Let end users know what needs to be done on their end for trouble-free patching.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Test the patches</strong> on a pilot group of systems before deploying them to the production environment. This will ensure that the patches do not interfere with the workings of other applications.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Since many users are working from home, they all might be working different hours; in this case, you can<strong> allow end users to skip deployment and scheduled reboots</strong>. This will give them the liberty to install updates at their convenience and avoid disrupting their work. Our patch management products come with options for <a href="https://www.manageengine.com/patch-management/flexible-deployment-policies.html">user-defined deployment and reboot</a>.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations are deploying patches using a VPN. To stop patch tasks from eating up your VPN bandwidth, install Critical patches and security updates first. You might want to <strong>hold off on deploying feature packs and cumulative updates</strong> since they are bulky updates and consume a lot of bandwidth.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Schedule the non-security updates and security updates</strong> that are not rated Critical to be deployed after Patch Tuesday, such as during the third or fourth week of the month. You can also choose to <a href="https://www.manageengine.com/patch-management/help/decline-patches.html">decline certain updates</a> if you feel they are not required in your environment.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Run patch reports</strong> to get a detailed view of the health status of your endpoints.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">For machines belonging to users returning to the office after working remotely, <strong>check if they are compliant</strong> with your security policies. If not, quarantine them. Install the latest updates and feature packs before deeming your back-to-office machines fit for production. Take inventory of and remove apps that are now obsolete for your back-to-office machines, like remote collaboration software.</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">With <a href="https://www.manageengine.com/products/desktop-central/">Endpoint Central</a>, <a href="https://www.manageengine.com/patch-management/">Patch Manager Plus</a>, or <a href="https://www.manageengine.com/vulnerability-management">Vulnerability Manager Plus,</a> you can completely automate the entire process of patch management, from testing patches to deploying them. You can also tailor patch tasks according to your current needs. For a hands-on experience with either of these products, try a free, 30-day trial and keep thousands of applications patched and secure.</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Want to learn more about Patch Tuesday updates? Join our experts as they break down this month’s Patch Tuesday updates and offer in-depth analysis. You can also ask our experts questions and get answers to all your Patch Tuesday questions. <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register">Register</a> for our free Patch Tuesday webinar.</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Ready, get set, patch!</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/09/11/september-2024-patch-tuesday-comes-with-fixes-for-79-vulnerabilities-including-4-zero-days.html">September 2024 Patch Tuesday comes with fixes for 79 vulnerabilities including 4 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/09/11/september-2024-patch-tuesday-comes-with-fixes-for-79-vulnerabilities-including-4-zero-days.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>August 2024 Patch Tuesday comes with fixes for 89 vulnerabilities and 10 zero-days</title>
		<link>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/08/14/august-2024-patch-tuesday-comes-with-fixes-for-89-vulnerabilities-and-10-zero-days.html</link>
					<comments>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/08/14/august-2024-patch-tuesday-comes-with-fixes-for-89-vulnerabilities-and-10-zero-days.html#respond</comments>
		
		<dc:creator><![CDATA[Anupam Kundu]]></dc:creator>
		<pubDate>Tue, 13 Aug 2024 20:27:15 +0000</pubDate>
				<category><![CDATA[Patch Manager Plus]]></category>
		<category><![CDATA[august patch tuesday]]></category>
		<category><![CDATA[Microsoft Patch Tuesday 2024]]></category>
		<category><![CDATA[Microsoft Patch Tuesday august]]></category>
		<guid isPermaLink="false">https://blogs.manageengine.com/?p=95225</guid>

					<description><![CDATA[<p>Welcome to the Patch Tuesday update for August 2024, which lists fixes for 89 vulnerabilities. This month, there are ten zero-day vulnerabilities, of which six...</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/08/14/august-2024-patch-tuesday-comes-with-fixes-for-89-vulnerabilities-and-10-zero-days.html">August 2024 Patch Tuesday comes with fixes for 89 vulnerabilities and 10 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2" data-doc-id="4504799000106286689" data-doc-type="writer">Welcome to the Patch Tuesday update for August 2024, which lists fixes for 89 vulnerabilities. This month, there are ten zero-day vulnerabilities, of which six are actively exploited while the other four have been publicly disclosed.</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">After an initial discussion about this month’s updates, we’ll offer our advice for devising a plan to handle patch management in a hybrid work environment. You can also <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_aug24blog">register</a> for our free Patch Tuesday webinar and listen to our experts break down Patch Tuesday updates in detail.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">What is Patch Tuesday?</h2>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Patch Tuesday falls on the second Tuesday of every month. On this day, Microsoft releases security and non-security updates for its operating system and other related applications. Since Microsoft has upheld this process of releasing updates in a periodic manner, IT admins expect these updates and have time to gear up for them.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Why is Patch Tuesday important?</h2>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Important security updates and patches to fix critical bugs or vulnerabilities are released on Patch Tuesday. Usually, zero-day vulnerabilities are also fixed during Patch Tuesday unless the vulnerability is critical and highly exploited, in which case an out-of-band security update is released to address that particular vulnerability.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">August 2024 Patch Tuesday</h2>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Security updates lineup </strong></p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here is a breakdown of the vulnerabilities fixed this month:</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVE IDs:</strong> 89 (this count doesn’t include the republished CVE IDs)</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Republished CVE IDs:</strong> 12 (more details on this below)</li>
</ul>
<p class="zw-paragraph" data-textformat="{&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-line-height="1.2"><strong>Security updates were released for the following products, features, and roles:</strong></p>
<ul data-list-id="87846258" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Secure Kernel Mode</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Kerberos</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Windows DNS</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows TCP/IP</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Office</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Azure Connected Machine Agent</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Kernel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Power Dependency Coordinator</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Azure Stack</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Azure Health Bot</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows IP Routing Management Snapin</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows NTFS</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Local Security Authority Server (lsasrv)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Routing and Remote Access Service (RRAS)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Bluetooth Driver</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Streaming Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Network Address Translation (NAT)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Clipboard Virtual Channel Extension</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows NT OS Kernel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Resource Manager</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Deployment Services</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Reliable Multicast Transport Driver (RMCAST)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Ancillary Function Driver for WinSock</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows WLAN Auto Config Service</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Layer-2 Bridge Network Driver</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows DWM Core Library</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Transport Security Layer (TLS)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft WDAC OLE DB provider for SQL</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Security Center</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Azure IoT SDK</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Network Virtualization</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Mobile Broadband</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Update Stack</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Compressed Folder</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Dynamics</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">.NET and Visual Studio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Office Visio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Office Excel</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Office PowerPoint</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Office Outlook</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows App Installer</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Scripting</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows SmartScreen</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Kernel-Mode Drivers</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Office Project</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Azure CycleCloud</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Common Log File System Driver</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Teams</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Print Spooler Components</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Line Printer Daemon Service (LPD)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Copilot Studio</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Mark of the Web (MOTW)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Cloud Files Mini Filter Driver</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Microsoft Edge (Chromium-based)</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="87846258" data-list-info="{&quot;id&quot;:87846258,&quot;l&quot;:0}">Windows Initial Machine Configuration</p>
</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Learn more in the <a href="https://msrc.microsoft.com/update-guide/releaseNote/2024-Aug">MSRC’s release notes</a>.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Details of the zero-day vulnerabilities</h2>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38193">CVE-2024-38193</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Ancillary Function Driver for WinSock</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Elevation of Privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Per Microsoft, an attacker could gain SYSTEM privileges on successful exploitation of this vulnerability.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38178">CVE-2024-38178</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Scripting Engine Memory Corruption Vulnerability</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Remote Code Execution</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS:</strong> 3.1 7.5</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">For this zero-day vulnerability to be exploited, an authenticated victim should click on a specially crafted URL prepared by the attacker. Clicking the link enables the attacker to initiate remote code execution.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38106">CVE-2024-38106</a></li>
</ul>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Kernel</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><span class="EOP"> </span><strong>Impact:</strong> Elevation of Privilege</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS:3.1</strong> 7.0</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Microsoft states that the vulnerability can be exploited on winning a RACE condition and grants the attacker access to SYSTEM privileges.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38213">CVE-2024-38213</a></li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Mark of the Web</p>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Impact:</strong> Security Feature Bypass Vulnerability<span data-range-char-type="start" data-bookmark-info="{&quot;name&quot;:&quot;_Tocbjcplp5o53hz&quot;,&quot;id&quot;:&quot;toc_ir2surva9bb6&quot;,&quot;type&quot;:&quot;bookmark&quot;,&quot;render_type&quot;:&quot;inline&quot;,&quot;geo_transformation&quot;:{&quot;translation&quot;:{&quot;x&quot;:false,&quot;y&quot;:false},&quot;scaling&quot;:{&quot;x&quot;:false,&quot;y&quot;:false},&quot;rotation&quot;:false}}" data-bookmark-id="toc_ir2surva9bb6"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;name&quot;:&quot;_Tocbjcplp5o53hz&quot;,&quot;id&quot;:&quot;toc_ir2surva9bb6&quot;,&quot;type&quot;:&quot;bookmark&quot;}" data-bookmark-id="toc_ir2surva9bb6"> </span></p>
<p class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="12pt" data-line-height="1.2"><span class="EOP"> </span><strong>CVSS 3.1:</strong> 6.5</p>
<p class="zw-paragraph" data-margin-bottom="12pt" data-line-height="1.2">Successful exploitation of this vulnerability allows the attacker to bypass the SmartScreen experience. However, for the exploitation to occur, users must open a malicious file that has been generated and shared by the attacker.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38107">CVE-2024-38107</a></li>
</ul>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Vulnerable component:</strong> Windows Power Dependency Coordinator</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Elevation of Privilege Vulnerability <span data-range-char-type="start" data-bookmark-info="{&quot;name&quot;:&quot;_Tocadpujdnxnm6m&quot;,&quot;id&quot;:&quot;toc_dwmqibykptck&quot;,&quot;type&quot;:&quot;bookmark&quot;,&quot;render_type&quot;:&quot;inline&quot;,&quot;geo_transformation&quot;:{&quot;translation&quot;:{&quot;x&quot;:false,&quot;y&quot;:false},&quot;scaling&quot;:{&quot;x&quot;:false,&quot;y&quot;:false},&quot;rotation&quot;:false}}" data-bookmark-id="toc_dwmqibykptck"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;name&quot;:&quot;_Tocadpujdnxnm6m&quot;,&quot;id&quot;:&quot;toc_dwmqibykptck&quot;,&quot;type&quot;:&quot;bookmark&quot;}" data-bookmark-id="toc_dwmqibykptck"> </span></p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>CVSS 3.1:</strong> 7.8</p>
<p class="zw-paragraph" data-textformat="{&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-line-height="1.2">A successful exploitation of this vulnerability enables access to SYSTEM privileges to the threat actor.</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38189">CVE-2024-38189</a></li>
</ul>
<p class="zw-paragraph heading1" data-header="1" data-margin-bottom="0pt" data-hd-info="1" data-line-height="1.2"><strong>Vulnerable component:</strong> Microsoft Project</p>
<p class="zw-paragraph heading0" data-header="0" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Impact:</strong> Remote Code Execution Vulnerability<span data-range-char-type="start" data-bookmark-info="{&quot;name&quot;:&quot;_Toc7cbj7y9d76g8&quot;,&quot;id&quot;:&quot;toc_jzrpbntq7fa6&quot;,&quot;type&quot;:&quot;bookmark&quot;,&quot;render_type&quot;:&quot;inline&quot;,&quot;geo_transformation&quot;:{&quot;translation&quot;:{&quot;x&quot;:false,&quot;y&quot;:false},&quot;scaling&quot;:{&quot;x&quot;:false,&quot;y&quot;:false},&quot;rotation&quot;:false}}" data-bookmark-id="toc_jzrpbntq7fa6"> </span><span data-range-char-type="end" data-bookmark-info="{&quot;name&quot;:&quot;_Toc7cbj7y9d76g8&quot;,&quot;id&quot;:&quot;toc_jzrpbntq7fa6&quot;,&quot;type&quot;:&quot;bookmark&quot;}" data-bookmark-id="toc_jzrpbntq7fa6"> </span></p>
<p class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12.00&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="12pt" data-line-height="1.2"><strong>CVSS 3.1:</strong> 8.8</p>
<p class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(0, 0, 0)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgba(0, 0, 0, 0)&quot;}" data-margin-bottom="12pt" data-line-height="1.2">Per Microsoft, &#8220;Exploitation requires the victim to open a malicious Microsoft Office Project file on a system where the <a href="https://learn.microsoft.com/en-us/microsoft-365-apps/security/internet-macros-blocked#block-macros-from-running-in-office-files-from-the-internet">Block macros from running in Office files from the Internet</a> policy is disabled and <a href="https://learn.microsoft.com/en-us/microsoft-365-apps/security/internet-macros-blocked#vba-macro-notification-settings">VBA Macro Notification Settings</a> are not enabled, allowing the attacker to perform remote code execution.&#8221;</p>
<p class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}" data-margin-bottom="12pt" data-line-height="1.2">Hence, they strongly recommend that users do not disable the Block macros from running in Office files from the Internet policy. The detailed mitigation steps can be <a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38189" target="undefined" rel="noopener">found here</a>.</p>
<p class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}" data-margin-bottom="12pt" data-line-height="1.2">The six above-mentioned vulnerabilities are being <strong>actively exploited</strong>, so it is strongly recommended to deploy the updates or perform the recommended mitigation steps as soon as possible.</p>
<p class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;10.50&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}" data-margin-bottom="12pt" data-line-height="1.2">The CVE IDs mentioned below have been <strong>publicly disclosed</strong>. However, as per Microsoft, the exploitation of these vulnerabilities are <strong>either less likely or have not been exploited till now</strong>. The following CVE IDs are:</p>
<ul data-list-id="27578463" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;none&quot;,&quot;fgc&quot;:&quot;rgb(36, 36, 36)&quot;,&quot;size&quot;:&quot;10.50&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-line-height="1.2" data-list-id="27578463" data-list-info="{&quot;id&quot;:27578463,&quot;l&quot;:0}"><a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38199">CVE-2024-38199</a></p>
<p><strong>Vulnerable component:</strong> Windows Line Printer Daemon (LPD) Service<br />
<strong>Impact:</strong> Remote Code Execution Vulnerability<br />
<strong>CVSS 3.1:</strong> 9.8</li>
</ul>
<ul data-list-id="73405728" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;paraFormat&quot;:{&quot;textFormat&quot;:{&quot;ff&quot;:&quot;zwminor&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;zwdark1&quot;,&quot;size&quot;:10,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}},&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;rgb(7, 7, 7)&quot;,&quot;size&quot;:&quot;13.50&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-line-height="1.2" data-list-id="73405728" data-list-info="{&quot;id&quot;:73405728,&quot;l&quot;:0}"><a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-21302">CVE-2024-21302</a><br class="zw-br" /><strong>Vulnerable component:</strong> Windows Secure Kernel Mode<br />
<strong>Impact:</strong> Elevation of Privilege Vulnerability<br />
<strong>CVSS 3.1:</strong> 6.7</p>
</li>
</ul>
<ul data-list-id="97348120" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;paraFormat&quot;:{&quot;textFormat&quot;:{&quot;ff&quot;:&quot;zwminor&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;zwdark1&quot;,&quot;size&quot;:10,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}},&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;rgb(7, 7, 7)&quot;,&quot;size&quot;:&quot;13.50&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-line-height="1.2" data-list-id="97348120" data-list-info="{&quot;id&quot;:97348120,&quot;l&quot;:0}"><a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38200">CVE-2024-38200</a> <br class="zw-br" /><strong>Vulnerable component:</strong> Microsoft Office <br class="zw-br" /><strong>Impact:</strong> Spoofing <br class="zw-br" /><strong>CVSS 3.1:</strong> 6.5</p>
</li>
</ul>
<ul data-list-id="67152642" data-list-format="{&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level0&quot;:{&quot;paraFormat&quot;:{&quot;textFormat&quot;:{&quot;ff&quot;:&quot;zwminor&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;zwdark1&quot;,&quot;size&quot;:10,&quot;va&quot;:&quot;baseline&quot;,&quot;fw_i&quot;:400,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}},&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;fv&quot;:&quot;normal&quot;,&quot;td&quot;:&quot;none&quot;,&quot;cs&quot;:&quot;0pt&quot;,&quot;fw&quot;:&quot;bold&quot;,&quot;fgc&quot;:&quot;rgb(7, 7, 7)&quot;,&quot;size&quot;:&quot;13.50&quot;,&quot;va&quot;:&quot;baseline&quot;,&quot;type&quot;:&quot;text&quot;,&quot;fs&quot;:&quot;normal&quot;,&quot;bgc&quot;:&quot;rgb(255, 255, 255)&quot;}" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-line-height="1.2" data-list-id="67152642" data-list-info="{&quot;id&quot;:67152642,&quot;l&quot;:0}"><a href="http://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38202">CVE-2024-38202</a> <br class="zw-br" /><strong>Vulnerable component:</strong> Windows Update Stack<br />
<strong>Impact:</strong> Elevation of Privilege<br />
<strong>CVSS 3.1:</strong> 7.3</p>
</li>
</ul>
<h2 class="zw-paragraph" data-textformat="{&quot;ff&quot;:&quot;Roboto&quot;,&quot;type&quot;:&quot;text&quot;}" data-margin-bottom="12pt" data-line-height="1.2">Republished CVE IDs</h2>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Besides the vulnerabilities fixed in this month’s Patch Tuesday, Microsoft has also republished four CVE IDs. These are as follows:</p>
<ul data-list-id="90527816" data-list-format="{&quot;level0&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level1&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level2&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level3&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level4&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level5&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1},&quot;level6&quot;:{&quot;type&quot;:6,&quot;startsWith&quot;:1},&quot;level7&quot;:{&quot;type&quot;:7,&quot;startsWith&quot;:1},&quot;level8&quot;:{&quot;type&quot;:8,&quot;startsWith&quot;:1}}" data-spl-bullet-format="{}">
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2022-2601</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2022-3775</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2023-40547</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2024-6990</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2024-7255</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2024-7256</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2024-7532</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2024-7533</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2024-7534</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2024-7535</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2024-7536</p>
</li>
<li>
<p class="zw-list zw-paragraph heading0" data-header="0" data-margin-left="0.5in" data-text-indent="-0.25in" data-margin-bottom="0pt" data-hd-info="0" data-line-height="1.2" data-list-id="90527816" data-list-info="{&quot;id&quot;:90527816,&quot;l&quot;:0}">CVE-2024-7550</p>
</li>
</ul>
<h2 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Third-party updates released after last month’s Patch Tuesday</h2>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Third-party vendors such as <strong>Android</strong>, <strong>Cisco</strong>, and <strong>Ivanti</strong> have also released updates this August.</p>
<h2 class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Best practices to handle patch management in a hybrid work environment</h2>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations have opted to embrace remote work even after they have been cleared to return to the office. This decision poses various challenges to IT admins, especially in terms of managing and securing distributed endpoints.</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Here are a few pointers to simplify the process of remote patching:</p>
<ul>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Disable automatic updates</strong> because one faulty patch could bring down the whole system. IT admins can educate end users on how to disable automatic updates on their machines. Patch Manager Plus and Endpoint Central also have a <a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html">dedicated</a><a href="https://www.manageengine.com/patch-management/how-to/disable-windows-automatic-updates.html"> patch</a>, 105427, that can be deployed to endpoints to ensure that automatic updates are disabled.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Create a restore point</strong>—a backup or image that captures the state of the machines—before deploying big updates like those from Patch Tuesday.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Establish a patching schedule</strong> and keep end users informed about it. It is recommended to set up a time for deploying patches and rebooting systems. Let end users know what needs to be done on their end for trouble-free patching.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Test the patches</strong> on a pilot group of systems before deploying them to the production environment. This will ensure that the patches do not interfere with the workings of other applications.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Since many users are working from home, they all might be working different hours; in this case, you can<strong> allow end users to skip deployment and scheduled reboots</strong>. This will give them the liberty to install updates at their convenience and avoid disrupting their work. Our patch management products come with options for <a href="https://www.manageengine.com/patch-management/flexible-deployment-policies.html">user-defined deployment and reboot</a>.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Most organizations are deploying patches using a VPN. To stop patch tasks from eating up your VPN bandwidth, install Critical patches and security updates first. You might want to <strong>hold off on deploying feature packs and cumulative updates</strong> since they are bulky updates and consume a lot of bandwidth.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Schedule the non-security updates and security updates</strong> that are not rated Critical to be deployed after Patch Tuesday, such as during the third or fourth week of the month. You can also choose to <a href="https://www.manageengine.com/patch-management/help/decline-patches.html">decline certain updates</a> if you feel they are not required in your environment.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2"><strong>Run patch reports</strong> to get a detailed view of the health status of your endpoints.</li>
<li class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">For machines belonging to users returning to the office after working remotely, <strong>check if they are compliant</strong> with your security policies. If not, quarantine them. Install the latest updates and feature packs before deeming your back-to-office machines fit for production. Take inventory of and remove apps that are now obsolete for your back-to-office machines, like remote collaboration software.</li>
</ul>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">With <a href="https://www.manageengine.com/products/desktop-central/?pt_aug24blog">Endpoint Central</a>, <a href="https://www.manageengine.com/patch-management/?pt_aug24blog">Patch Manager Plus</a>, or <a href="https://www.manageengine.com/vulnerability-management?pt_aug24blog">Vulnerability Manager Plus,</a> you can completely automate the entire process of patch management, from testing patches to deploying them. You can also tailor patch tasks according to your current needs. For a hands-on experience with either of these products, try a free, 30-day trial and keep thousands of applications patched and secure.</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Want to learn more about Patch Tuesday updates? Join our experts as they break down this month’s Patch Tuesday updates and offer in-depth analysis. You can also ask our experts questions and get answers to all your Patch Tuesday questions. <a href="https://www.manageengine.com/patch-management/patch-tuesday.html#register?pt_aug24blog">Register</a> for our free Patch Tuesday webinar.</p>
<p class="zw-paragraph heading0" data-header="0" data-margin-bottom="12pt" data-hd-info="0" data-line-height="1.2">Ready, get set, patch!</p>
<p>The post <a href="https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/08/14/august-2024-patch-tuesday-comes-with-fixes-for-89-vulnerabilities-and-10-zero-days.html">August 2024 Patch Tuesday comes with fixes for 89 vulnerabilities and 10 zero-days</a> appeared first on <a href="https://blogs.manageengine.com">ManageEngine Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://blogs.manageengine.com/desktop-mobile/patch-manager-plus/2024/08/14/august-2024-patch-tuesday-comes-with-fixes-for-89-vulnerabilities-and-10-zero-days.html/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
