Microsoft Patch Tuesday: 10 Zero-Day Bugs Exposed

Lilu Anderson
Photo: Finoracle.net

Microsoft Discloses Critical Vulnerabilities in August Patch

Attackers are actively exploiting six out of 90 disclosed vulnerabilities that Microsoft announced in its August security update. This makes them a top priority for system administrators. Among the disclosed vulnerabilities, four were publicly known before Microsoft's August 13 announcement but had not yet been exploited by attackers. These are still considered "zero-day" flaws.

Unpatched Threats and Elevation of Privilege

A noteworthy zero-day bug, CVE-2024-38202, involves the Windows Update Stack. This vulnerability allows attackers with basic user privileges to reintroduce previously fixed vulnerabilities or bypass some security features like Virtualization Based Security (VBS). Microsoft has rated this as moderately severe due to the necessity of deceiving a user or administrator into performing a system restore.

If this bug is combined with CVE-2024-21302, another elevation of privilege flaw that affects the Windows Secure Kernel, it escalates the risk. Together, these vulnerabilities allow attackers to reverse software updates without needing any privileged user interaction.

Critical and Important Vulnerabilities

In addition to the zero-days, Microsoft rated seven vulnerabilities as critical. Seventy-nine vulnerabilities were classified as important or medium severity, often requiring some user interaction for exploitation.

Remote Code Execution Vulnerabilities

Two actively exploited vulnerabilities enable remote code execution (RCE). The first, CVE-2024-38189, affects Microsoft Project Remote Code. This vulnerability is particularly concerning for organizations with disabled VBA Macro Notification Settings. Attackers could remotely execute arbitrary code by tricking a user to open a malicious Microsoft Office Project file.

The second, CVE-2024-38178, involves a memory corruption issue in the Windows Scripting Engine. Successful exploitation requires users to be on Edge in Internet Explorer Mode and to click on a crafted URL.

Elevation of Privilege Flaws

Three zero-day vulnerabilities allow attackers to gain system admin privileges. CVE-2024-38106 involves a race condition combined with improper memory handling in the Windows Kernel. CVE-2024-38107 affects Windows Power Dependency, and CVE-2024-38193 is found in the Windows Ancillary Function Driver for WinSock.

Bypassing Security Protections

The final zero-day under active exploitation, CVE-2024-38213, bypasses Windows Mark of the Web (MoTW) protections. This flaw allows attackers to introduce malicious files into enterprise environments without being marked as untrusted. It typically forms part of a broader exploit chain.

Understanding Terminology: Zero-day refers to vulnerabilities that are known to hackers before the vendor has a patch, making them potentially more dangerous. Elevation of Privilege (EoP) is a type of vulnerability where an attacker gains higher access rights, allowing them to perform unauthorized actions.

Simple Example: Imagine your home has a locked door (security feature), but there's a small window that was accidentally left open (vulnerability). A burglar (attacker) can climb through the window to unlock your door from the inside, allowing them and others to enter freely. This is similar to how vulnerabilities like EoP allow attackers to gain unauthorized access to systems.

Share This Article
Lilu Anderson is a technology writer and analyst with over 12 years of experience in the tech industry. A graduate of Stanford University with a degree in Computer Science, Lilu specializes in emerging technologies, software development, and cybersecurity. Her work has been published in renowned tech publications such as Wired, TechCrunch, and Ars Technica. Lilu’s articles are known for their detailed research, clear articulation, and insightful analysis, making them valuable to readers seeking reliable and up-to-date information on technology trends. She actively stays abreast of the latest advancements and regularly participates in industry conferences and tech meetups. With a strong reputation for expertise, authoritativeness, and trustworthiness, Lilu Anderson continues to deliver high-quality content that helps readers understand and navigate the fast-paced world of technology.