Alcune aziende che ci hanno scelto

Privacy Officer e consulente privacy
Schema CDP secondo la norma ISO/IEC 17024:2012
European Privacy Auditor
Schema di Certificazione ISDP©10003 secondo la norma ISO/IEC 17065:2012
Valutatore Privacy
Secondo la norma UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
Secondo la norma ISO/IEC 17024:2012
Data Protection Officer
Secondo la norma ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
Secondo la norma ISO/IEC 17024:2012
ICT Security Manager
Secondo la norma UNI 11506:2017
IT Service Management (ITSM)
Secondo l’Ente ITIL Foundation
Ethical Hacker (CEH)
Secondo l’Ente EC-Council
Network Defender (CND)
Secondo l’Ente EC-Council
Computer Hacking Forensics Investigator (CHFI)
Secondo l’Ente EC-Council
Penetration Testing Professional (CPENT)
Secondo l’Ente EC-Council

Qualifiche professionali

Rimani aggiornato sulle notizie dal mondo!

Seleziona gli argomenti di tuo interesse:
ALLERTA CYBER
Home / ALLERTA CYBER
/
Aggiornamenti Mensili Microsoft (AL01/241211/CSIRT-ITA)

Aggiornamenti Mensili Microsoft (AL01/241211/CSIRT-ITA)

Sintesi

Microsoft ha rilasciato gli aggiornamenti di sicurezza mensili che risolvono un totale di 71 nuove vulnerabilità, di cui una di tipo 0-day.

Note: un Proof of Concept (PoC) per lo sfruttamento della CVE-2024-49138 risulta disponibile in rete.

Rischio

Stima d’impatto della vulnerabilità sulla comunità di riferimento: GRAVE/ROSSO (76,66/100)1.

Tipologia

  • Elevation of Privilege
  • Spoofing
  • Remote Code Execution
  • Denial of Service
  • Defense in Depth
  • Information Disclosure

Prodotti e versioni affette

  • Microsoft Defender for Endpoint
  • Microsoft Edge (Chromium-based)
  • Microsoft Office
  • Microsoft Office Access
  • Microsoft Office Excel
  • Microsoft Office Publisher
  • Microsoft Office SharePoint
  • Microsoft Office Word
  • Remote Desktop Client
  • Role: DNS Server
  • Role: Windows Hyper-V
  • System Center Operations Manager
  • Windows Cloud Files Mini Filter Driver
  • Windows Common Log File System Driver
  • Windows File Explorer
  • Windows IP Routing Management Snapin
  • Windows Kernel
  • Windows Kernel-Mode Drivers
  • Windows LDAP – Lightweight Directory Access Protocol
  • Windows Local Security Authority Subsystem Service (LSASS)
  • Windows Message Queuing
  • Windows Mobile Broadband
  • Windows PrintWorkflowUserSvc
  • Windows Remote Desktop
  • Windows Remote Desktop Services
  • Windows Resilient File System (ReFS)
  • Windows Routing and Remote Access Service (RRAS)
  • Windows Task Scheduler
  • Windows Virtualization-Based Security (VBS) Enclave
  • Windows Wireless Wide Area Network Service
  • WmsRepair Service

Azioni di mitigazione

In linea con le dichiarazioni del vendor, si raccomanda di procedere all’aggiornamento dei prodotti impattati attraverso l’apposita funzione di Windows Update.

Identificatori univoci vulnerabilità

CVE-ID
CVE-2024-49101CVE-2024-49099CVE-2024-49126CVE-2024-49097
CVE-2024-49075CVE-2024-49090CVE-2024-49081CVE-2024-49119
CVE-2024-49116CVE-2024-49092CVE-2024-49110CVE-2024-49129
CVE-2024-49096CVE-2024-49088CVE-2024-49083CVE-2024-49106
CVE-2024-49057CVE-2024-49062CVE-2024-49068CVE-2024-49072
CVE-2024-49132CVE-2024-49098CVE-2024-49059CVE-2024-49103
CVE-2024-49093CVE-2024-43600CVE-2024-49142CVE-2024-49078
CVE-2024-49122CVE-2024-49095CVE-2024-49069CVE-2024-49114
CVE-2024-49121CVE-2024-49065CVE-2024-49086CVE-2024-49115
CVE-2024-49079CVE-2024-49109CVE-2024-49087CVE-2024-49124
CVE-2024-49080CVE-2024-49082CVE-2024-43594CVE-2024-49107
CVE-2024-49127CVE-2024-49064CVE-2024-49070CVE-2024-49085
CVE-2024-49073CVE-2024-49102CVE-2024-49117CVE-2024-49094
CVE-2024-49128CVE-2024-49138ADV240002CVE-2024-49118
CVE-2024-49084CVE-2024-49091CVE-2024-49112CVE-2024-49123
CVE-2024-49104CVE-2024-49125CVE-2024-49108CVE-2024-49074
CVE-2024-49076CVE-2024-49077CVE-2024-49113CVE-2024-49120
CVE-2024-49063CVE-2024-49111CVE-2024-49089

Riferimenti

https://msrc.microsoft.com/update-guide/releaseNote/2024-Dec

https://msrc.microsoft.com/update-guide (NB: filtro: patch tuesday – December 2024)

1La presente stima è effettuata tenendo conto di diversi parametri, tra i quali: CVSS, disponibilità di patch/workaround e PoC, diffusione dei software/dispositivi interessati nella comunità di riferimento.

Suggeriti per te

Ricerca in 365TRUST

I nostri servizi