Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Microsoft Issues Update Fixing 118 Flaws

October 9, 2024
Reading Time: 2 mins read
in Alerts
Microsoft Issues Update Fixing 118 Flaws

Microsoft has rolled out an extensive security update aimed at fixing a total of 118 vulnerabilities across its software portfolio. Among these, two vulnerabilities have been identified as actively exploited in the wild, raising significant concerns for users and organizations alike. The Patch Tuesday update categorizes three flaws as Critical, 113 as Important, and two as Moderate in severity. This release underscores the ongoing challenges faced by software developers in safeguarding their platforms against increasingly sophisticated cyber threats.

The two actively exploited vulnerabilities, CVE-2024-43572 and CVE-2024-43573, are particularly noteworthy. CVE-2024-43572 is a remote code execution vulnerability in the Microsoft Management Console, while CVE-2024-43573 is a spoofing vulnerability in the Windows MSHTML platform. Both have been added to the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities catalog, which requires federal agencies to implement fixes by October 29, 2024. This urgent directive highlights the critical nature of these flaws and the potential risk they pose to government and private sector systems.

In addition to the two vulnerabilities under active exploitation, the update addresses several other serious flaws. One of the most severe is a remote execution flaw in Microsoft Configuration Manager, rated at a CVSS score of 9.8. This vulnerability could allow unauthenticated attackers to execute arbitrary commands on affected systems, posing a significant risk to organizational security. Additionally, two other Critical-rated vulnerabilities relate to remote code execution in Visual Studio Code extensions for Arduino and the Remote Desktop Protocol (RDP) Server, further emphasizing the broad scope of the vulnerabilities patched in this release.

As organizations scramble to apply the latest updates, cybersecurity experts emphasize the importance of timely patch management. “The exploitation of these vulnerabilities can lead to serious security breaches, making it essential for organizations to prioritize these updates,” said Satnam Narang, a senior staff research engineer at Tenable. With the threat landscape continuously evolving, staying informed and proactive about software updates is crucial for maintaining cybersecurity resilience. Organizations are encouraged to implement robust security measures, including multifactor authentication and regular system audits, to safeguard against potential exploits stemming from these vulnerabilities.

Reference:
  • Microsoft Addresses 118 Vulnerabilities Including Two Actively Exploited Zero-Days
Tags: Cyber AlertsCyber Alerts 2024Cyber threatsMicrosoftOctober 2024Remote code executionUpdatesVulnerabilities
ADVERTISEMENT

Related Posts

Crocodilus Trojan Steals Crypto Globally

Crocodilus Trojan Steals Crypto Globally

June 4, 2025
Crocodilus Trojan Steals Crypto Globally

Bogus CAPTCHA Lures Install NetSupport RAT

June 4, 2025
Crocodilus Trojan Steals Crypto Globally

Fake RubyGems Steal Telegram Bot Tokens

June 4, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

Fake FB Ban Fix Extension Steals Accounts

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

Actively Exploited Chrome V8 Flaw Patched

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

DevOps Servers Hit By JINX0132 Crypto Mine

June 3, 2025

Latest Alerts

Bogus CAPTCHA Lures Install NetSupport RAT

Crocodilus Trojan Steals Crypto Globally

Fake RubyGems Steal Telegram Bot Tokens

Fake FB Ban Fix Extension Steals Accounts

Actively Exploited Chrome V8 Flaw Patched

DevOps Servers Hit By JINX0132 Crypto Mine

Subscribe to our newsletter

    Latest Incidents

    Malaysia Home Minister WhatsApp Breached

    MainStreet Bank Faces Vendor Data Breach

    BitoPro Loses $11.5M In DeFi Hack Wave

    Cartier Data Breach Exposes Client Info

    White House Chief of Staff’s Phone Hacked

    The North Face Hit By 4th Credential Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial