Alcune aziende che ci hanno scelto

Privacy Officer e consulente privacy
Schema CDP secondo la norma ISO/IEC 17024:2012
European Privacy Auditor
Schema di Certificazione ISDP©10003 secondo la norma ISO/IEC 17065:2012
Valutatore Privacy
Secondo la norma UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
Secondo la norma ISO/IEC 17024:2012
Data Protection Officer
Secondo la norma ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
Secondo la norma ISO/IEC 17024:2012
ICT Security Manager
Secondo la norma UNI 11506:2017
IT Service Management (ITSM)
Secondo l’Ente ITIL Foundation
Ethical Hacker (CEH)
Secondo l’Ente EC-Council
Network Defender (CND)
Secondo l’Ente EC-Council
Computer Hacking Forensics Investigator (CHFI)
Secondo l’Ente EC-Council
Penetration Testing Professional (CPENT)
Secondo l’Ente EC-Council

Qualifiche professionali

Rimani aggiornato sulle notizie dal mondo!

Seleziona gli argomenti di tuo interesse:
ALLERTA CYBER
Home / ALLERTA CYBER
/
Aggiornamenti Mensili Microsoft (AL07/240409/CSIRT-ITA) – Aggiornamento

Aggiornamenti Mensili Microsoft (AL07/240409/CSIRT-ITA) – Aggiornamento

Sintesi

Microsoft ha rilasciato gli aggiornamenti di sicurezza mensili che risolvono un totale di 150 nuove vulnerabilità.

Note (aggiornamento del 30/04/2024): un Proof of Concept (PoC) per lo sfruttamento della vulnerabilità CVE-2024-26218 risulta disponibile in rete.

Note (aggiornamento del 10/04/2024): le CVE-2024-29988 e CVE-2024-26234 risulterebbero essere sfruttate attivamente in rete.

Rischio (aggiornamento del 30/04/2024)

Stima d’impatto della vulnerabilità sulla comunità di riferimento: GRAVE/ROSSO (77,17/100)1.

Tipologia

  • Elevation of Privilege
  • Information Disclosure
  • Spoofing
  • Security Feature Bypass
  • Denial of Service
  • Remote Code Execution

Prodotti e versioni affette

  • .NET and Visual Studio
  • Azure
  • Azure AI Search
  • Azure Arc
  • Azure Compute Gallery
  • Azure Migrate
  • Azure Monitor
  • Azure Private 5G Core
  • Azure SDK
  • Internet Shortcut Files
  • Microsoft Azure Kubernetes Service
  • Microsoft Brokering File System
  • Microsoft Defender for IoT
  • Microsoft Edge (Chromium-based)
  • Microsoft Install Service
  • Microsoft Office Excel
  • Microsoft Office Outlook
  • Microsoft Office SharePoint
  • Microsoft WDAC ODBC Driver
  • Microsoft WDAC OLE DB provider for SQL
  • Role: DNS Server
  • Role: Windows Hyper-V
  • SQL Server
  • Windows Authentication Methods
  • Windows BitLocker
  • Windows Compressed Folder
  • Windows Cryptographic Services
  • Windows Defender Credential Guard
  • Windows DHCP Server
  • Windows Distributed File System (DFS)
  • Windows DWM Core Library
  • Windows File Server Resource Management Service
  • Windows HTTP.sys
  • Windows Internet Connection Sharing (ICS)
  • Windows Kerberos
  • Windows Kernel
  • Windows Local Security Authority Subsystem Service (LSASS)
  • Windows Message Queuing
  • Windows Mobile Hotspot
  • Windows Proxy Driver
  • Windows Remote Access Connection Manager
  • Windows Remote Procedure Call
  • Windows Routing and Remote Access Service (RRAS)
  • Windows Secure Boot
  • Windows Storage
  • Windows Telephony Server
  • Windows Update Stack
  • Windows USB Print Driver
  • Windows Virtual Machine Bus
  • Windows Win32K – ICOMP

Azioni di mitigazione

In linea con le dichiarazioni del vendor, si raccomanda di procedere all’aggiornamento dei prodotti impattati attraverso l’apposita funzione di Windows Update.

Identificatori univoci vulnerabilità

CVE-ID
CVE-2024-28898CVE-2024-29983CVE-2024-28940CVE-2024-28936
CVE-2024-26224CVE-2024-26241CVE-2024-28897CVE-2024-26240
CVE-2024-29056CVE-2024-29989CVE-2024-26229CVE-2024-28934
CVE-2024-28896CVE-2024-26234CVE-2024-20688CVE-2024-26230
CVE-2024-20669CVE-2024-26223CVE-2024-26235CVE-2024-26250
CVE-2024-26253CVE-2024-26200CVE-2024-26231CVE-2024-28915
CVE-2024-20678CVE-2024-26233CVE-2024-29993CVE-2024-28919
CVE-2024-28939CVE-2024-28926CVE-2024-29055CVE-2024-23593
CVE-2024-28924CVE-2024-28904CVE-2024-26217CVE-2024-26257
CVE-2024-28913CVE-2024-26212CVE-2024-26244CVE-2024-26251
CVE-2024-26195CVE-2024-28909CVE-2024-29992CVE-2024-26232
CVE-2024-28911CVE-2024-29985CVE-2024-26254CVE-2024-28903
CVE-2024-28920CVE-2024-28906CVE-2024-26210CVE-2024-28922
CVE-2024-23594CVE-2024-26239CVE-2024-26236CVE-2024-26227
CVE-2024-29064CVE-2024-21324CVE-2024-28942CVE-2024-28912
CVE-2024-28907CVE-2024-26243CVE-2024-29046CVE-2024-28932
CVE-2024-26194CVE-2024-28929CVE-2024-26158CVE-2024-26205
CVE-2024-26222CVE-2024-28943CVE-2024-26171CVE-2024-26218
CVE-2024-29047CVE-2024-26256CVE-2024-21323CVE-2024-28900
CVE-2024-29044CVE-2024-29053CVE-2024-28945CVE-2024-29050
CVE-2024-26168CVE-2024-29982CVE-2024-28930CVE-2024-26237
CVE-2024-28931CVE-2024-28921CVE-2024-21424CVE-2024-26183
CVE-2024-28905CVE-2024-26255CVE-2024-26228CVE-2024-29066
CVE-2024-28935CVE-2024-29054CVE-2024-26189CVE-2024-26209
CVE-2024-26180CVE-2024-26208CVE-2024-28941CVE-2024-20670
CVE-2024-21409CVE-2024-26226CVE-2024-20689CVE-2024-28923
CVE-2024-29988CVE-2024-26211CVE-2024-28925CVE-2024-26219
CVE-2024-28908CVE-2024-29045CVE-2024-2201CVE-2024-26193
CVE-2024-29052CVE-2024-26248CVE-2024-28938CVE-2024-29043
CVE-2024-21447CVE-2024-28937CVE-2024-28933CVE-2024-26221
CVE-2024-29984CVE-2024-29062CVE-2024-26172CVE-2024-26179
CVE-2024-26215CVE-2024-20693CVE-2024-29063CVE-2024-26207
CVE-2024-28944CVE-2024-26242CVE-2024-26216CVE-2024-26245
CVE-2024-29048CVE-2024-26175CVE-2024-26214CVE-2024-21322
CVE-2024-28914CVE-2024-26252CVE-2024-26220CVE-2024-28927
CVE-2024-28902CVE-2024-26213CVE-2024-26202CVE-2024-28910
CVE-2024-29061CVE-2024-28917CVE-2024-20665CVE-2024-29990
CVE-2024-20685CVE-2024-28901

Riferimenti

https://msrc.microsoft.com/update-guide/releaseNote/2024-Apr

https://msrc.microsoft.com/update-guide (NB: filtro: patch tuesday – April 2024)

1La presente stima è effettuata tenendo conto di diversi parametri, tra i quali: CVSS, disponibilità di patch/workaround e PoC, diffusione dei software/dispositivi interessati nella comunità di riferimento.

Suggeriti per te

Ricerca in 365TRUST

I nostri servizi