Warning of 16 security vulnerabilities causing Microsoft products to be attacked
The list of security vulnerabilities in Microsoft products warned this time mainly allows attackers to execute remote code including: 3 vulnerabilities CVE-2024-21322, CVE-2024-21323, CVE2024- 29053 in 'Microsoft Defender for IoT'; CVE-2024-26256 vulnerability in the open source library Libarchive; CVE-2024-26257 vulnerability in Microsoft Excel spreadsheet; 7 vulnerabilities CVE-2024-26221, CVE-2024-26222, CVE2024-26223, CVE-2024-26224, CVE-2024-26227, CVE-2024-26231 and CVE2024-26233 in Windows DNS Server.
In particular, experts believe that two vulnerabilities need special attention, namely the vulnerability CVE-2024-20678 in Remote Procedure Call Runtime (a Windows component that facilitates communication between different processes in the system). system over the network), allowing attackers to execute remote code and the vulnerability CVE-2024-29988 in the SmartScreen security feature built into Windows, allows attackers to bypass security mechanisms. guard.
Along with that, units need to pay additional attention to two vulnerabilities that allow subjects to perform spoofing attacks (Spoofing). These are the vulnerability CVE-2024-20670 in Outlook for Windows software that exposes NTML hashes and the vulnerability CVE-2024-26234 in Proxy Driver.
The above vulnerabilities were warned by the Information Security Department on the basis of evaluation and analysis from the April 2024 patch list announced by Microsoft with 147 vulnerabilities existing in this technology company's products.
Faced with the above situation, the Department of Information Security recommends that agencies, organizations as well as businesses immediately check, review and identify computers using the Windows operating system that are likely to be affected.
At the same time, update the patch promptly to avoid the risk of cyber attacks. The goal is to ensure information security for the units' information systems, contributing to ensuring the safety of Vietnam's cyberspace.
In addition, units should strengthen monitoring and be ready with solutions when detecting signs of cyber exploitation or attack. Regularly monitor warning channels of authorities and large information security organizations to promptly detect cyber attack risks.
Security vulnerabilities are one of the leading causes of cyber attacks targeting information systems of organizations and businesses in the world and Vietnam. In particular, high-level and serious vulnerabilities, if not handled immediately, will put agencies and organizations at immediate risk of attack.
Statistics published by the Department of Information Security at the end of last year showed that more than 70% of organizations have not paid attention to reviewing and updating and patching warned vulnerabilities and weaknesses.
You should read it
- Instructions for creating the fastest Microsoft account
- Microsoft Office is now Microsoft 365. Here's how you could get it for free
- Microsoft will also have smart watches
- How to Become a Microsoft MVP
- 11 best tips to get started with Microsoft Loop
- Link Download Microsoft Word 2019
- Link download Microsoft Teams 1.3.00.3564
- What is Microsoft Store AI Hub?
May be interested
- 5 common errors in managing security vulnerabilitiesin the eyes of some people the issue of managing vulnerabilities is considered one of the intensive security management activities. there are others who think this is just a necessary process that microsoft has to make
- Warning: The number of vulnerabilities in open source software are increasing rapidlybesides malware, spam emails or ddos attacks, vulnerabilities in open source software are also considered as one of the most significant security threats at the moment.
- Warning: Jenkins exists a serious security hole that helps hackers gain control of computers of many Vietnamese businesseslast night, september 18, vsec - vietnam cyber security joint stock company issued an emergency warning about a serious security hole in the open source application jenkins.
- Update Adobe Reader against zero-day errorsit is a security expert's warning for users who have installed adobe reader 9.2 and flash player 10 backwards and are widely attacked by hackers.
- IBM developed a new technology to patch security holestop security researchers at ibm have recently developed a new technique to etch almost entirely the impact of security vulnerabilities before they are actually found.
- Microsoft issued a warning about macOS security errors, urging users to update the software immediatelythe microsoft security team recently issued a warning about a vulnerability that exists in a bug in apple's transparency, consent and control (tcc) technology. tcc is a technology that has been around since 2012.
- Microsoft was attacked by Syrian Electronic Armthe syrian electronic army hackers team (sea) promised that they would continue to attack microsoft, and today the team hacked the official microsoft office blog just hours after the web was applied to the new interface.
- Microsoft fixes 149 security vulnerabilities on Windows, users should update immediatelymicrosoft just released an april security update to fix 149 security vulnerabilities on windows, two of which are actively exploited in the wild.
- Immediately fix critical vulnerabilities in Windows NTLM security protocolresearchers on firewall preempt behavior have discovered two new vulnerabilities in windows ntlm security protocols. let's see what those holes are and how serious it is!
- Warning about serious vulnerabilities in SQL Serversystems running sql server 2000, sql server 2005, sql server 2005 express edition, sql server 2000 desktop engine (msde 2000), ... can be exploited and controlled