Description:
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://msrc.microsoft.com/update-guide/releaseNote/2024-Feb
Reports indicated that the vulnerabilities (CVE-2024-21351 and CVE-2024-21412) in Microsoft Windows and Server are being exploited in the wild. System administrators and users are advised to take immediate action to patch your affected systems to mitigate the elevated risk of cyber attacks.
Reports indicated that the remote code execution vulnerability (CVE-2024-21413) in Microsoft Outlook is at a high risk of exploitation and the elevation of privilege vulnerability (CVE-2024-21410) in Microsoft Exchange Server is being exploited in the wild. System administrators and users are advised to take urgent actions to patch your affected systems to mitigate the elevated risk of cyber attacks.
Affected Systems:
- Microsoft Windows 10, 11
- Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, 2022, 2022, 23H2
- Microsoft Office 2016, 2019, LTSC 2021
- Microsoft Excel 2016
- Microsoft Word 2016
- Microsoft PowerPoint 2016
- Microsoft Outlook 2016
- Microsoft 365 Apps for Enterprise
- Microsoft Exchange Server 2016, 2019
- Microsoft Visual Studio 2022
- Microsoft Visio 2016
- .NET 6.0, 7.0, 8.0
- ASP.NET Core 6.0, 7.0, 8.0
- Azure Active Directory
- Azure Connected Machine Agent, File Sync v14.0, File Sync v15.0, File Sync v16.0, File Sync v17.0, Kubernetes Service Confidential Containers, Site Recovery
- Azure DevOps Server 2019, 2020, 2022
- Azure Stack Hub
- Microsoft Defender for Endpoint
- Microsoft Dynamics 365 (on-premises) version 9.1
- Microsoft Dynamics 365 Business Central 2022 Release Wave 2, 2023 Release Wave 1, 2023 Release Wave 2
- Microsoft Publisher 2016
- Microsoft Teams for Android
- Skype for Business 2016
- Skype for Business Server 2019
Impact:
Successful exploitation of the vulnerabilities could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security feature bypass or spoofing on affected systems.
Recommendation:
Patches for affected systems are available from the Windows Update / Microsoft Update Catalog. System administrators and users of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
More Information:
- https://msrc.microsoft.com/update-guide/releaseNote/2024-Feb
- https://www.hkcert.org/security-bulletin/microsoft-monthly-security-update-february-2024
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20667
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20673
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20679
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20695
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21304
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21315
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21327 (to CVE-2024-21329)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21338 (to CVE-2024-21372)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21374 (to CVE-2024-21381)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21384
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21386
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21389
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21391
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21393 (to CVE-2024-21397)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21401 (to CVE-2024-21406)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21410
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21412 (to CVE-2024-21413)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21420