11-11-2024, 08:49 AM
In September 2024, several critical vulnerabilities were actively exploited:
CVE-2024-43491: A critical remote code execution vulnerability in Microsoft Windows Update's Servicing Stack, affecting Windows 10 Version 1507. Exploitation allowed attackers to reverse previously implemented security fixes, leading to potential system compromise.
CVE-2024-38014: An elevation of privilege vulnerability in Windows Installer, enabling attackers to gain SYSTEM-level privileges, thereby taking full control of affected systems.
CVE-2024-38226: A vulnerability in Microsoft Publisher that allowed authenticated attackers to bypass Office macro policies by tricking users into opening specially crafted files, potentially leading to the execution of malicious code.
CVE-2024-38217: A security feature bypass in Windows Mark of the Web (MOTW), permitting attackers to create files that evade MOTW defenses, potentially disabling security features like SmartScreen and Windows Attachment Services.
CVE-2024-43491: A critical remote code execution vulnerability in Microsoft Windows Update's Servicing Stack, affecting Windows 10 Version 1507. Exploitation allowed attackers to reverse previously implemented security fixes, leading to potential system compromise.
CVE-2024-38014: An elevation of privilege vulnerability in Windows Installer, enabling attackers to gain SYSTEM-level privileges, thereby taking full control of affected systems.
CVE-2024-38226: A vulnerability in Microsoft Publisher that allowed authenticated attackers to bypass Office macro policies by tricking users into opening specially crafted files, potentially leading to the execution of malicious code.
CVE-2024-38217: A security feature bypass in Windows Mark of the Web (MOTW), permitting attackers to create files that evade MOTW defenses, potentially disabling security features like SmartScreen and Windows Attachment Services.