August’24 Patch Tuesday: Six Actively Exploited Zero-Day Vulnerabilities

In its August 2024 Patch Tuesday release, Microsoft addressed 88 vulnerabilities, including seven critical flaws and ten zero-day vulnerabilities. Notably, six of these zero-day vulnerabilities are currently being actively exploited in the wild, underscoring the urgent need for organizations to implement patches without delay.

Comprehensive Update Scope

This extensive update affects a wide range of Microsoft products, including:

  • Microsoft Office and Components
  • Microsoft Windows DNS
  • Windows TCP/IP
  • Microsoft Teams
  • Windows Secure Boot
  • Windows Secure Kernel Mode
  • Windows Security Center
  • Windows SmartScreen
  • Windows App Installer
  • Windows Scripting

The vulnerabilities covered include various types such as Spoofing, Denial of Service (DoS), Elevation of Privilege (EoP), Cross-site Scripting (XSS), Information Disclosure, Security Feature Bypass, and the severe Remote Code Execution (RCE).

Zero-Day Vulnerabilities Demand Immediate Attention

The six actively exploited zero-day vulnerabilities, along with three additional publicly disclosed zero-days (CVE-2024-21302, CVE-2024-38202, and CVE-2024-38199), pose a significant threat to both organizations and individuals. Additionally, there is a tenth publicly disclosed zero-day vulnerability (CVE-2024-38200) for which Microsoft has not yet released a patch, further compounding the risk.

Key Zero-Day Vulnerabilities

The following actively exploited zero-day vulnerabilities were addressed in this Patch Tuesday release:

  • CVE-2024-38178: Scripting Engine Memory Corruption Vulnerability
    Exploitable when an attacker convinces an authenticated user to visit a specially crafted URL, leading to memory corruption within the scripting engine and potentially arbitrary code execution.
  • CVE-2024-38193: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
    This flaw allows attackers to gain SYSTEM privileges by targeting a kernel entry point within the Windows Ancillary Function Driver (AFD) for WinSock, posing a significant security risk due to the potential for deep system access.
  • CVE-2024-38213: Windows SmartScreen Security Feature Bypass Vulnerability
    This vulnerability enables attackers to bypass Windows SmartScreen, designed to protect users from malicious websites and downloads. By tricking users into opening a malicious file, the attacker can circumvent SmartScreen’s defenses, leading to further attacks.
  • CVE-2024-38106: Windows Kernel Elevation of Privilege Vulnerability
    Involving a race condition within the Windows kernel, this vulnerability can be exploited to gain SYSTEM privileges. Given the kernel’s role as the core of the OS, successful exploitation could have system-wide impacts.
  • CVE-2024-38189: Microsoft Project Remote Code Execution Vulnerability
    Attackers can exploit this vulnerability in Microsoft Project via email or web-based attacks, potentially leading to remote code execution if a user is tricked into opening a malicious file.
  • CVE-2024-38107: Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
    This flaw in the Power Dependency Coordinator component of Modern Standby could allow attackers to gain SYSTEM privileges, presenting a significant risk to affected systems.

CISA’s Response and Recommendations

In response to these threats, the Cybersecurity and Infrastructure Security Agency (CISA) has added the actively exploited vulnerabilities to its Known Exploited Vulnerabilities Catalog. CISA has mandated that federal agencies patch these vulnerabilities by September 3, 2024.

Recommendation: All users and organizations are strongly advised to prioritize patching these vulnerabilities immediately to mitigate potential risks and safeguard their systems.

Share This: