Microsoft's December Patch Tuesday Fixes 71 Vulnerabilities, Including 1 Zero-Day
Microsoft has released its December 2024 Patch Tuesday updates, addressing 71 vulnerabilities, including one actively exploited zero-day. Affected platforms range from Windows Server 2008 to modern systems like Windows 11 and Windows Server 2025.
Summary of Updates
16 Critical Vulnerabilities: All involve remote code execution.
Vulnerability Categories:
27 Elevation of Privilege
30 Remote Code Execution (RCE)
7 Information Disclosure
5 Denial of Service
1 Spoofing
This list excludes two Microsoft Edge vulnerabilities resolved earlier on December 5 and 6.
Zero-Day Vulnerability:
CVE-2024-49138: Windows Common Log File System Driver Elevation of Privilege Vulnerability.
This zero-day vulnerability enables attackers to gain SYSTEM privileges on Windows devices.
While the flaw was actively exploited, details of its use in attacks remain undisclosed. It was identified by CrowdStrike’s Advanced Research Team, and further insights are expected.
Critical RCE Vulnerabilities
Other critical RCE vulnerabilities include flaws in:
Recommended by LinkedIn
Elevation of Privilege Vulnerabilities
Microsoft has addressed multiple Elevation of Privilege (EoP) vulnerabilities in its latest updates, crucial for preventing unauthorized access to elevated system privileges.
Key Elevation of Privilege Fixes:
Windows 11:
Windows 10:
Windows Server:
BleepingComputer has full description of each vulnerability and the systems it affects, you can view the full report here.
Importance of Applying Updates
With many vulnerabilities marked as Important or Critical, these updates are vital to prevent exploitation. Microsoft urges organizations and individuals to apply these updates promptly using Windows Update or deployment tools to mitigate security threats.
This December 2024 Patch Tuesday underscores the importance of staying current with system updates. As cyberattacks grow increasingly sophisticated, addressing critical issues such as Remote Code Execution and Elevation of Privilege vulnerabilities is essential.
Ensure your systems are protected by applying these patches immediately. For detailed information, refer to Microsoft’s official security update documentation.
OK Boštjan Dolinšek
If I'm not mistaken, there are still legacy systems vulnerable, my customers are switching to linux based systems for Microsoft products within a controlled perimeter. This is scarier than I thought. 🤔 CLFS vulnerablity has been existant since 2003.
Nejsem si jist, hraje-li s námi Bůh stále stejnou hru. (Einstein)
3wJako cedník, milostivá, jako cedník.
Azure Technical Specialist - Core Infrastructure, Sales Technical Unit | Microsoft Italy
3wPlease patch. Just schedule a restart and patch.
Innovation Junkie, Cyber Intelligence, Coffee Snob
3wGet’s me thinking... Each update is a chance to make our systems better. Small steps today lead to big security wins down the road.