Close Menu
CloudSecNewsHub
  • News
  • Technologies
  • Automation
  • Updates
  • Guides
  • Tools
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025
Facebook X (Twitter) Instagram
Trending
  • Google Cloud Security Plitz attacks e -hunting, improves vision
  • How to pick up criminal evidence for Microsoft 365
  • Cloud security treatment: American federal edition
  • The most prominent report: 2025 Experience of exposure to cloud data
  • Artificial intelligence agents to convert Google Cloud Security Ops
  • The necessity of cloud security in the electronic scene today
  • Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies
  • Ransomware Spike displays cracks in cloud safety
Facebook X (Twitter) Instagram Pinterest Vimeo
CloudSecNewsHubCloudSecNewsHub
  • News

    How to pick up criminal evidence for Microsoft 365

    May 8, 2025

    The most prominent report: 2025 Experience of exposure to cloud data

    May 7, 2025

    Artificial intelligence agents to convert Google Cloud Security Ops

    May 6, 2025

    Ransomware Spike displays cracks in cloud safety

    May 5, 2025

    Sentinelone wins the best safety point and cloud security at the 2025 SC Awards

    May 1, 2025
  • Technologies

    Gartner: How to build a safe institution cloud environment

    April 21, 2025

    Promote South Korea's national security by adopting the cloud

    April 11, 2025

    “The traditional methods of cloud safety, where organizations depend on the segmented cloud safety tools, are not simply enough”

    April 3, 2025

    Stream.security The cloud solution in actual time in industry with TRP technology designed to dilute proactively from the effect of breach in the cloud

    April 1, 2025

    Skyhawk's creation platform mentioned in 2024 Gartner Emerging Tech Impact Radar: Preventive Cyber ​​Security

    March 28, 2025
  • Automation

    Cloud Security Alliance launches an initiative to automate compliance

    April 30, 2025

    The security automation market to see a great expansion

    April 25, 2025

    GSA FedRAMP '20X' rejuvenation keys to automation, to the approvals in “Weeks” – MERITALK

    April 16, 2025

    Cortex Cloud – cloud safety conversion

    April 11, 2025

    TUFIN extends the possibilities of the security of the cloud and the network with the latest version of the synchronous pavilion

    April 8, 2025
  • Updates

    Google Cloud Security Plitz attacks e -hunting, improves vision

    May 8, 2025

    April 2025 Correction Tuesday: updates and analysis

    April 15, 2025

    Google Cloud 2025: News and updates

    April 12, 2025

    5 Google Big Google Aman ads on the next 2025

    April 9, 2025

    Google offers a unified safety platform and safety agents driven by artificial intelligence

    April 9, 2025
  • Guides

    CISO guide for effective cloud security strategies

    April 30, 2025

    Singapore offers instructions to support the cloud and the elasticity of the first place

    April 29, 2025

    Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

    April 5, 2025

    What is the safety of the cloud? | IBM

    April 3, 2025

    Google gets Wiz for $ 32 billion to boost cloud safety

    March 19, 2025
  • Tools

    Cloud security treatment: American federal edition

    May 7, 2025

    The necessity of cloud security in the electronic scene today

    May 6, 2025

    Crowdstrike (CRWD) launches Amnesty International Security tools to improve the cloud p

    April 30, 2025

    The 5 best CNAPP benefits that you need to know in 2025

    April 26, 2025

    The security coalition cloud launches the latest security report. Saas

    April 26, 2025
  • Compliance

    Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies

    May 5, 2025

    Ensuring commitment to international standards

    April 29, 2025

    Thales and Deloitte are an alliance to enhance the security and compliance data strategies

    April 22, 2025

    AWS security compliance is easy: IT-Magic Devops solutions for a stronger security situation

    April 21, 2025

    5 ways that banks can achieve smooth security and compliance in 2025

    April 14, 2025
Login
CloudSecNewsHub
Home»Updates»Microsoft's July update fixes 143 vulnerabilities, including two that were actively exploited
Updates

Microsoft's July update fixes 143 vulnerabilities, including two that were actively exploited

CloudSecNewsHubBy CloudSecNewsHubJuly 10, 2024No Comments5 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Microsoft's July Update Fixes 143 Vulnerabilities, Including Two That Were
Share
Facebook Twitter LinkedIn Pinterest Email

Microsoft has released patches to address a total of 143 vulnerabilities as part of its monthly security updates, two of which are actively exploited in the wild.

Five of the 143 vulnerabilities are rated critical, 136 are important, and four are moderate. The fixes come in addition to 33 vulnerabilities that were addressed in the Chromium-based Edge browser over the past month.

The two vulnerabilities that were exploited are as follows:

CVE-2024-38080 (CVSS Score: 7.8) – Windows Hyper-V Elevation of Privilege Vulnerability CVE-2024-38112 (CVSS Score: 7.5) – Windows MSHTML Platform Spoofing Vulnerability

Microsoft said of the vulnerability, CVE-2024-38112: “Successful exploitation of this vulnerability requires the attacker to take additional actions prior to exploitation to prepare the target environment. The attacker must send a malicious file to the victim before the victim can execute it.”

Check Point security researcher Haifei Li, who is credited with discovering and reporting the flaw in May 2024, said that threat actors are taking advantage of specially crafted Windows Internet Shortcut (.URL) files, which when clicked, redirect victims to a malicious URL by invoking the retired Internet Explorer (IE) browser.

Cyber ​​Security

“An additional trick in Internet Explorer is used to hide the name of the malicious .HTA extension. By opening the URL using Internet Explorer instead of the modern and more secure Chrome/Edge browser on Windows, the attacker gains significant advantages in exploiting the victim’s computer, even though the computer is running the latest Windows 10/11 operating system,” he explained to me.

Artifacts using the attack technique were uploaded to malware scanning platform VirusTotal as early as January 2023, indicating that threat actors have been aware of the vulnerability for more than 1.5 years.

Check Point told The Hacker News that it observed .URL samples being used to deliver a data thief called Atlantida, which was documented by Rapid7 earlier this year as malware that allows the theft of login credentials, cryptocurrency wallet data, information stored in web browsers, screenshots, and device data.

The malware campaign, which primarily targeted users in Turkey and Vietnam in mid-May 2024, reportedly abused compromised WordPress sites to launch attacks via HTML Application (.HTA) and PowerShell files to deliver Atlántida to victim hosts.

Initial findings from Check Point indicate that at least two different threat groups are exploiting CVE-2024-38112 in simultaneous campaigns as part of what is suspected to be a financially motivated operation.

“We saw a computer chip manufacturer and a company developing better-designed products (targeted),” the company said, adding, “Both are high-tech companies, which could indicate a supply chain attack or product interest.”

“CVE-2024-38080 is a privilege escalation vulnerability in Windows Hyper-V. An authenticated, local attacker could exploit this vulnerability to escalate privileges to the system level after an initial compromise of a targeted system,” said Satnam Narang, Senior Research Engineer at Tenable.

While the exact details surrounding the CVE-2024-38080 abuse are currently unknown, Narang noted that this is the first of 44 Hyper-V flaws that have become exploitable since 2022.

Two other vulnerabilities that Microsoft has patched are listed as publicly known at the time of release. These include a side-by-side attack called FetchBench (CVE-2024-37985, CVSS score: 5.9) that could allow an adversary to view the cache from a privileged process running on Arm-based systems.

The second publicly announced vulnerability is CVE-2024-35264 (CVSS score: 8.1), a remote code execution bug that affects .NET and Visual Studio.

“An attacker could exploit this issue by closing the http/3 stream while the request body is being processed, resulting in a race condition. This could lead to remote code execution,” Redmond said in an advisory.

37 remote code execution vulnerabilities affecting the SQL Server Native Client OLE DB provider, 20 Secure Boot bypass vulnerabilities, three PowerShell privilege escalation bugs, and a RADIUS spoofing vulnerability (CVE-2024-3596 also known as BlastRADIUS) were also resolved as part of the Patch Tuesday updates.

“The SQL Server flaws specifically affect the OLE DB provider, so not only will SQL Server versions need to be updated, but client code running vulnerable versions of the connection driver will also need to be addressed,” said Greg Weisman, principal product manager at Rapid7.

“For example, an attacker could use social engineering tactics to trick an authenticated user into attempting to connect to a SQL Server database that is configured to return malicious data, allowing arbitrary code to be executed on the client.”

Cyber ​​Security

The long list of fixes is completed by CVE-2024-38021 (CVSS score: 8.8), a remote code execution flaw in Microsoft Office that, if successfully exploited, could allow an attacker to gain elevated privileges, including read, write, and delete functions.

Morphisec, which reported the flaw to Microsoft in late April 2024, said the vulnerability requires no authentication and poses a high risk due to its zero-click nature.

“Attackers could exploit this vulnerability to gain unauthorized access, execute arbitrary code, and cause significant damage without any user interaction,” said Michael Gorelick. “The lack of authentication requirements makes it particularly dangerous, as it opens the door to widespread exploitation.”

These fixes come as Microsoft announced late last month that it would begin releasing CVE IDs for cloud-related vulnerabilities in the future in an effort to improve transparency.

Software patches from other vendors

In addition to Microsoft, security updates have also been released by other vendors in the past few weeks to patch several vulnerabilities, including –

(Story updated after publication to include additional comments from Check Point.)

Did you find this article interesting? Follow us on Twitter  and LinkedIn to read more of our exclusive content.

actively exploited Fixes including July Microsoft39s Update Vulnerabilities
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOrca Security Appoints Dell Veteran Zscaler as New Channel Head
Next Article Tuesday July 2024 Updates and Analysis
admin
CloudSecNewsHub
  • Website

Related Posts

Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025
Updates

April 2025 Correction Tuesday: updates and analysis

April 15, 2025
Updates

Google Cloud 2025: News and updates

April 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

CloudSecNewsHubMay 8, 2025
News

How to pick up criminal evidence for Microsoft 365

CloudSecNewsHubMay 8, 2025
Tools

Cloud security treatment: American federal edition

CloudSecNewsHubMay 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Don't Miss

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 CloudSecNewsHub. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?