icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Microsoft Fixes Six Actively Exploited Bugs

Summary:
On August 14, 2024, Microsoft issued patches for six actively exploited vulnerabilities as part of its regular Patch Tuesday updates. These flaws affect Microsoft Project, various Windows products, and the Windows Scripting Engine. Notably, one high-severity vulnerability in Microsoft Project (CVE-2024-38189) could allow remote code execution if a victim opens a malicious file. Other significant flaws include memory corruption in the Scripting Engine (CVE-2024-38178) and elevation-of-privilege bugs in the Windows Ancillary Function Driver and Power Dependency Coordinator (CVE-2024-38193, CVE-2024-38107).

Security Officer Comments:
Additionally, Microsoft addressed a flaw in Windows Kernel (CVE-2024-38106) and a moderate-severity issue in Windows Mark of the Web (CVE-2024-38213). The updates also included fixes for other serious vulnerabilities, such as a remote code execution flaw in Windows TCP/IP (CVE-2024-38063). The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to apply these patches within three weeks.

Suggested Corrections:
To effectively manage vulnerabilities, organizations should establish a patch management policy that includes a regular update schedule and assigns responsibilities. Maintain an inventory of assets and prioritize patches based on severity. Test patches in a staging environment to ensure compatibility before deployment. Use automated tools for systematic patch application and monitor progress to address any issues. Communicate with stakeholders about updates and provide training on best practices. After deployment, verify installations and conduct audits to ensure effectiveness. Continuously review and improve the policy to adapt to new threats and technological changes.

Link(s):
https://duo.com/decipher/microsoft-fixes-six-actively-exploited-bugs