Windows 11 and 10 users need to update their systems now

Báo Thanh niênBáo Thanh niên12/12/2024


According to Microsoft, this update fixes a total of 71 security vulnerabilities across the company's applications and services. Of these, 16 are classified as "critical", while the rest (except one) are rated as "high risk". Notably, one of the Windows security vulnerabilities has been exploited in the wild, so timely patching is crucial.

Người dùng Windows 11 và 10 cần cập nhật hệ thống ngay- Ảnh 1.

A total of 71 security vulnerabilities have been fixed in this update.

Microsoft patched a total of 1,020 security vulnerabilities throughout 2024, marking the second-worst year for security issues, behind only 1,250 in 2020. While Microsoft provides limited details on the vulnerabilities in its Security Update Guide, one analyst said the security patches are critical for network management for administrators.

It's not just Windows 11 and 10 that are victims

In this update, 59 security vulnerabilities were discovered in multiple versions of Windows (10, 11, and Server) that Microsoft still supports. Although Windows 7 and 8.1 no longer receive security updates, they may still be vulnerable. Users are recommended to upgrade to Windows 10 22H2 or Windows 11 23H2 to continue receiving security patches. The Windows 11 24H2 update is available, but users should wait until the common issues are fixed.

Microsoft said it has seen attacks on the CVE-2024-49138 vulnerability, a buffer overflow in the shared file system driver that allows an attacker to gain system privileges through elevation of privilege. Combined with the RCE (remote code execution) vulnerability, an attacker could take full control of a Windows system and cause serious damage.

Người dùng Windows 11 và 10 cần cập nhật hệ thống ngay- Ảnh 2.

Users can check for updates in Windows Update

Microsoft has classified 16 RCE vulnerabilities in Windows as critical, with the Remote Desktop service accounting for nine of them. One of the notable vulnerabilities is CVE-2024-49112, which exists in the Lightweight Directory Access Protocol (LDAP), allowing attackers to inject code without the user logging in. Microsoft recommends disconnecting vulnerable domain controllers from the internet to mitigate the risk.

In addition, the RCE vulnerability CVE-2024-49117 in Hyper-V is also rated as serious, allowing code from the guest system to be executed on the server with just a simple user account.

Microsoft also fixed eight vulnerabilities in Office products, including three RCE vulnerabilities. One of them, CVE-2024-49065, can be exploited through Outlook previews to attach files. While an attacker cannot access user data, they can prevent access to the data.

As for CVE-2024-49063, this is the first security vulnerability in the field of artificial intelligence (AI) found in the Muzic research project. This vulnerability allows attackers to develop malicious code that will be executed when the data stream is converted to an object.

The next patch is expected to be released by Microsoft on January 14, 2025. Users are advised to regularly update their operating systems and use reputable antivirus software and VPN services to protect their devices.



Source: https://thanhnien.vn/nguoi-dung-windows-11-va-10-can-cap-nhat-he-thong-ngay-185241211232116543.htm

Tag: share

Comment (0)

No data
No data

Event Calendar

Cùng chủ đề

Cùng chuyên mục

Cùng tác giả

No videos available