Security News > 2022 > April > Microsoft Zero-Days, Wormable Bugs Spark Concern
Microsoft has released patches for 128 security vulnerabilities for its April 2022 monthly scheduled update - ten of them rated critical.
It's listed as a "Windows Common Log File System Driver Execution Vulnerability," and was reported to Microsoft by the National Security Agency.
Even though it's listed as exploitation more likely, it has a high attack complexity, Microsoft noted in its advisory, because "Successful exploitation of this vulnerability requires an attacker to win a race condition."
Out of the critical flaws, all of which allow remote code-execution, researchers flagged a bug that could allow for self-propagating exploits as being of the most concern.
Microsoft recommends configuring firewall rules to help prevent this vulnerability from being exploited; the static port used can be blocked at the network perimeter.
"The first is that dynamic updates must be enabled for a server to be affected by this bug. The CVSS also lists some level of privileges to exploit. Still, any chance of an attacker getting RCE on a DNS server is one too many, so get your DNS servers patched."
News URL
https://threatpost.com/microsoft-zero-days-wormable-bugs/179273/
Related news
- Microsoft October 2024 Patch Tuesday fixes 5 zero-days, 118 flaws (source)
- Microsoft patches two zero-days exploited in the wild (CVE-2024-43573, CVE-2024-43572) (source)
- Week in review: Microsoft fixes two exploited zero-days, SOC teams are losing trust in security tools (source)
- Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 91 flaws (source)
- Microsoft November 2024 Patch Tuesday fixes 4 zero-days, 89 flaws (source)
- Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039) (source)
- Microsoft patches Windows zero-day exploited in attacks on Ukraine (source)
- Microsoft launches Zero Day Quest hacking event with $4 million in rewards (source)
- Microsoft announces Zero Day Quest hacking event with big rewards (source)