CSIRT Toscana

Aggiornamenti Mensili Microsoft (AL01/240911/CSIRT-ITA) – Aggiornamento

Data:
17 Settembre 2024 09:10

Data di creazione: 11/09/2024 – 08:43

Sintesi

Microsoft ha rilasciato gli aggiornamenti di sicurezza mensili che risolvono un totale di 79 nuove vulnerabilità, di cui 4 di tipo 0-day.

Note (aggiornamento del 17/09/2024):  il vendor afferma che le CVE-2024-38014CVE-2024-38217CVE-2024-38226CVE-2024-43491CVE-2024-43461 e CVE-2024-38112 risultano sfruttate attivamente in rete.

Rischio

Stima d’impatto della vulnerabilità sulla comunità di riferimento: GRAVE/ROSSO (77,05/100)1.

Tipologia

  • Spoofing
  • Information Disclosure
  • Denial of Service
  • Security Feature Bypass
  • Remote Code Execution
  • Elevation of Privilege

Prodotti e versioni affette

  • Azure CycleCloud
  • Azure Network Watcher
  • Azure Stack
  • Azure Web Apps
  • Dynamics Business Central
  • Microsoft AutoUpdate (MAU)
  • Microsoft Dynamics 365 (on-premises)
  • Microsoft Graphics Component
  • Microsoft Management Console
  • Microsoft Office Excel
  • Microsoft Office Publisher
  • Microsoft Office SharePoint
  • Microsoft Office Visio
  • Microsoft Outlook for iOS
  • Microsoft Streaming Service
  • Power Automate
  • SQL Server
  • Windows Admin Center
  • Windows AllJoyn API
  • Windows Authentication Methods
  • Windows DHCP Server
  • Windows Installer
  • Windows Hyper-V
  • Windows Kerberos
  • Windows Kernel-Mode Drivers
  • Windows Libarchive
  • Windows Mark of the Web (MOTW)
  • Windows MSHTML Platform
  • Windows Network Address Translation (NAT)
  • Windows Network Virtualization
  • Windows PowerShell
  • Windows Remote Access Connection Manager
  • Windows Remote Desktop Licensing Service
  • Windows Security Zone Mapping
  • Windows Setup and Deployment
  • Windows Standards-Based Storage Management Service
  • Windows Storage
  • Windows TCP/IP
  • Windows Update
  • Windows Win32K – GRFX
  • Windows Win32K – ICOMP

Azioni di mitigazione

In linea con le dichiarazioni del vendor, si raccomanda di procedere all’aggiornamento dei prodotti impattati attraverso l’apposita funzione di Windows Update.

Identificatori univoci vulnerabilità

CVE-ID
CVE-2024-43463 CVE-2024-43454 CVE-2024-43479 CVE-2024-30073
CVE-2024-26191 CVE-2024-43465 CVE-2024-21416 CVE-2024-38249
CVE-2024-43492 CVE-2024-38240 CVE-2024-38258 CVE-2024-38230
CVE-2024-37337 CVE-2024-37980 CVE-2024-43474 CVE-2024-38014
CVE-2024-38225 CVE-2024-38248 CVE-2024-38245 CVE-2024-43491
CVE-2024-38260 CVE-2024-43495 CVE-2024-26186 CVE-2024-38234
CVE-2024-43455 CVE-2024-43464 CVE-2024-38242 CVE-2024-43476
CVE-2024-38216 CVE-2024-43467 CVE-2024-43470 CVE-2024-38018
CVE-2024-43458 CVE-2024-38046 CVE-2024-43482 CVE-2024-37341
CVE-2024-43461 CVE-2024-37340 CVE-2024-37342 CVE-2024-43457
CVE-2024-38246 CVE-2024-43469 CVE-2024-38238 CVE-2024-38228
CVE-2024-37966 CVE-2024-38250 CVE-2024-38194 CVE-2024-38254
CVE-2024-37965 CVE-2024-38226 CVE-2024-38263 CVE-2024-37339
CVE-2024-38256 CVE-2024-38188 CVE-2024-38220 CVE-2024-38119
CVE-2024-38233 CVE-2024-38244 CVE-2024-38045 CVE-2024-38239
CVE-2024-38232 CVE-2024-38236 CVE-2024-43466 CVE-2024-38241
CVE-2024-38217 CVE-2024-38235 CVE-2024-37335 CVE-2024-38237
CVE-2024-38257 CVE-2024-38259 CVE-2024-38253 CVE-2024-43475
CVE-2024-38252 CVE-2024-37338 CVE-2024-38247 CVE-2024-38243
CVE-2024-43487 CVE-2024-38227 CVE-2024-38231 CVE-2024-38112

Riferimenti

https://msrc.microsoft.com/update-guide/releaseNote/2024-Sep

https://msrc.microsoft.com/update-guide (NB: filtro: patch tuesday – September 2024)

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112

1La presente stima è effettuata tenendo conto di diversi parametri, tra i quali: CVSS, disponibilità di patch/workaround e PoC, diffusione dei software/dispositivi interessati nella comunità di riferimento.

Il presente articolo è un prodotto originale di csirt.gov.it, riproposto qui a solo scopo di aumentarne la visibilità.