Microsoft’s March Updates Repair 61 Vulnerabilities, Together with Important Hyper-V Flaws

Microsoft Updates

Microsoft on Tuesday launched its month-to-month safety replace, addressing 61 different security flaws spanning its software program, together with two crucial points impacting Home windows Hyper-V that might result in denial-of-service (DoS) and distant code execution.

Of the 61 vulnerabilities, two are rated Important, 58 are rated Essential, and one is rated Low in severity. Not one of the flaws are listed as publicly identified or beneath lively assault on the time of the discharge, however six of them have been tagged with an “Exploitation Extra Doubtless” evaluation.

The fixes are along with 17 security flaws which have been patched within the firm’s Chromium-based Edge browser for the reason that launch of the February 2024 Patch Tuesday updates.

Topping the listing of crucial shortcomings are CVE-2024-21407 and CVE-2024-21408, which have an effect on Hyper-V and will lead to distant code execution and a DoS situation, respectively.

Microsoft’s replace additionally addresses privilege escalation flaws within the Azure Kubernetes Service Confidential Container (CVE-2024-21400, CVSS rating: 9.0), Home windows Composite Picture File System (CVE-2024-26170, CVSS rating: 7.8), and Authenticator (CVE-2024-21390, CVSS rating: 7.1).


Profitable exploitation of CVE-2024-21390 requires the attacker to have a neighborhood presence on the system both through malware or a malicious software already put in through another means. It additionally necessitates that the sufferer closes and re-opens the Authenticator app.

“Exploitation of this vulnerability might permit an attacker to realize entry to multi-factor authentication codes for the sufferer’s accounts, in addition to modify or delete accounts within the authenticator app however not stop the app from launching or operating,” Microsoft said in an advisory.

“Whereas exploitation of this flaw is taken into account much less probably, we all know that attackers are eager to seek out methods to bypass multi-factor authentication,” Satnam Narang, senior workers analysis engineer at Tenable, stated in a press release shared with The Hacker Information.

“Accessing a goal system is unhealthy sufficient as they will monitor keystrokes, steal knowledge and redirect customers to phishing web sites, but when the purpose is to stay stealth, they might preserve this entry and steal multi-factor authentication codes with a view to login to delicate accounts, steal knowledge or hijack the accounts altogether by altering passwords and changing the multi-factor authentication system, successfully locking the person out of their accounts.”

One other vulnerability of word is a privilege escalation bug within the Print Spooler part (CVE-2024-21433, CVSS rating: 7.0) that might allow an attacker to acquire SYSTEM privileges however solely upon successful a race situation.

The replace additionally plugs a distant code execution flaw in Alternate Server (CVE-2024-26198, CVSS rating: 8.8) that an unauthenticated risk actor might abuse by inserting a specifically crafted file onto a web-based listing and tricking a sufferer into opening it, ensuing within the execution of malicious DLL recordsdata.

The vulnerability with the very best CVSS ranking is CVE-2024-21334 (CVSS rating: 9.8), which issues a case of distant code execution affecting the Open Administration Infrastructure (OMI).

“A distant unauthenticated attacker might entry the OMI occasion from the Web and ship specifically crafted requests to set off a use-after-free vulnerability,” Redmond stated.


“The primary quarter of Patch Tuesday in 2024 has been quieter in comparison with the final 4 years,” Narang stated. “On common, there have been 237 CVEs patched within the first quarter from 2020 by 2023. Within the first quarter of 2024, Microsoft solely patched 181 CVEs. The typical variety of CVEs patched in March over the past 4 years was 86.”

Software program Patches from Different Distributors

Along with Microsoft, safety updates have additionally been launched by different distributors over the previous few weeks to rectify a number of vulnerabilities, together with —

Notify of
Inline Feedbacks
View all comments
Previous Post
Google's Post-Quantum Upgrade Doesn't Mean We're All Protected Yet

Google’s Put up-Quantum Improve Does not Imply We’re All Protected But

Next Post
Israeli Universities Hit by Supply Chain Cyberattack Campaign

Israeli Universities Hit by Provide Chain Cyberattack Marketing campaign

Related Posts