1、 Summary
Recently, Ge Yun noticed that Microsoft released a security patch update for May 2024, revealing a total of 59 security vulnerabilities, one of which was marked as a serious vulnerability. Attackers can exploit vulnerabilities to achieve remote code execution, privilege escalation, security function bypass, and more. The affected applications include: Microsoft Windows Components such as Microsoft Office, Microsoft Dynamics, Visual Studio, etc.
Microsoft official explanation:
https://msrc.microsoft.com/update-guide/releaseNote/2024-May
This time, users need to pay attention to the following details that have been publicly disclosed/have been exploited by wild attacks:
Windows DWM core library privilege escalation vulnerability (CVE-2024-30051): 0day vulnerability, successfully exploited to enable low privilege local attackers to gain SYSTEM privileges. At present, it has been discovered that there is a high risk of wild attack and exploitation.
Windows MSHTML platform security feature bypass vulnerability (CVE-2024-30040): 0day vulnerability, an unauthenticated attacker triggers a vulnerability by inducing users to open specially crafted malicious files. Successful exploitation of the vulnerability can lead to the execution of arbitrary code on the target host. At present, it has been discovered that there is a high risk of wild attack and exploitation.
Visual Studio Denial of Service Vulnerability (CVE-2024-30046): 0day vulnerability, successful exploitation of which will result in a denial of service. At present, the vulnerability has been publicly disclosed and the risk is high.
There are 10 vulnerabilities that have been officially marked as more likely to be exploited this month (such as CVE-2024-30049) For details, please refer to the official announcement. Huawei Cloud reminds users to conduct timely security checks and reinforce their security to reduce the risk of being attacked.
2、 Vulnerability level
Vulnerability level: [Severe]
(Explanation: There are four levels of vulnerabilities: general, important, serious, and urgent)
3、 Scope of influence
Products such as Microsoft Windows, Microsoft Office, Microsoft Dynamics, Visual Studio, etc.
5、 Safety advice
1. Microsoft patches can be automatically updated through Windows Update to fix vulnerabilities, or patches can be manually downloaded from:
https://msrc.microsoft.com/update-guide
2. To ensure data security, it is recommended to backup important business data remotely.
Attention: Before fixing the vulnerability, please backup the data and conduct thorough testing.