iTnews Asia
  • Home
  • News
  • Security

Microsoft patches 80 vulnerabilities

Microsoft patches 80 vulnerabilities

Two bugs under exploit, plus other critical patches.

By Richard Chirgwin on Feb 14, 2024 11:19AM

Microsoft’s regular Patch Tuesday bug-fixes have landed, with a total of 80 vulnerabilities, two of which the company said are under active exploitation, plus several critical-rated bugs.

The exploited vulnerabilities are CVE-2024-21412 (CVSS score 8.1) and CVE-2024-21351 (CVSS score 7.6).

CVE-2024-21412 bypasses Microsoft’s Internet shortcut files security feature, if the attacker can trick a user into opening a malicious file (for example, via a phishing attack); while CVE-2024-21351 bypasses Windows SmartScreen security, again via the victim opening a malicious file.

The critical vulnerabilities include CVE-2024-21380, CVE-2024-21410 and CVE-2024-21413.

CVE-2024-21380 is an information disclosure vulnerability in Dynamics Business Central (formerly Dynamics NAV).

If the victim clicks on a malicious link, an authenticated attacker can trigger a race condition that “could lead to the attacker gaining the ability to interact with other tenant’s applications and content.”

CVE-2024-21410 is a critical escalation of privilege vulnerability in Microsoft Exchange Server, arising because of an NTLM credential leakage allowing an attacker to authenticate with leaked user credentials.

CVE-2024-21413 is a remote code execution (RCE) vulnerability in Outlook, going back as far as Office 2016.

Attackable via the preview pane, Microsoft said exploitation “would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.”

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
microsoft patch tuesday security

Related Articles

  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
  • Akamai: AI-security is both a security imperative and an economic necessity
  • The real-life Tom & Jerry chase
  • How can we bolster our resilience against AI-enabled e-mail attacks?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

Akamai: AI-security is both a security imperative and an economic necessity

Akamai: AI-security is both a security imperative and an economic necessity

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.