Home Microsoft Apple and Google Simply Patched Their First Zero-Day Flaws of the 12 months

Apple and Google Simply Patched Their First Zero-Day Flaws of the 12 months

0
Apple and Google Simply Patched Their First Zero-Day Flaws of the 12 months

[ad_1]

Later in January, Google launched Chrome 121 to the secure channel, fixing 17 safety points, three of that are rated as having a excessive affect. These embrace CVE-2024-0807, a use-after-free flaw in WebAudio, and CVE-2024-0812, an inappropriate implementation vulnerability in accessibility. The ultimate high-impact vulnerability is CVE-2024-0808, an integer underflow in WebUI.

Clearly, these updates are necessary, so test and apply them as quickly as you’ll be able to.

Microsoft

Microsoft’s January Patch Tuesday squashes practically 50 bugs in its standard software program, together with 12 distant code execution (RCE) flaws.

No safety holes included on this month’s set of updates are recognized to have been utilized in assaults, however notable flaws embrace CVE-2024-20677, a bug in Microsoft Workplace that would permit attackers to create malicious paperwork with embedded FBX 3D mannequin recordsdata to execute code.

To mitigate this vulnerability, the power to insert FBX recordsdata has been disabled in Phrase, Excel, PowerPoint, and Outlook for Home windows and Mac. Variations of Workplace that had this characteristic enabled will not have entry to it, Microsoft mentioned.

In the meantime, CVE-2024-20674 is a Home windows Kerberos safety characteristic bypass vulnerability rated as vital with a CVSS rating of 8.8. In a single state of affairs for this vulnerability, the attacker might persuade a sufferer to hook up with an attacker-controlled malicious software, Microsoft mentioned. “Upon connecting, the malicious server might compromise the protocol,” the software program large added.

Mozilla Firefox

Sizzling on the heels of its market-dominant competitor Chrome, Mozilla’s Firefox has patched 15 safety flaws in its newest replace. 5 of the bugs are rated as having a excessive severity, together with CVE-2024-0741, an out-of-bounds write challenge in Angle that would permit an attacker to deprave reminiscence, resulting in an exploitable crash.

An unchecked return worth in TLS handshake code tracked as CVE-2024-0743 might additionally trigger an exploitable crash.

CVE-2024-0755 covers reminiscence security bugs mounted in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. “A few of these bugs confirmed proof of reminiscence corruption and we presume that with sufficient effort a few of these might have been exploited to run arbitrary code,” Mozilla mentioned.

Cisco

Enterprise software program large Cisco has patched a vulnerability in a number of Cisco Unified Communications and Contact Heart Options merchandise that would permit an unauthenticated, distant attacker to execute arbitrary code on an affected machine.

Tracked as CVE-2024-20253 and with a whopping CVSS rating of 9.9, Cisco mentioned an attacker might exploit the vulnerability by sending a crafted message to a listening port of an affected machine.

“A profitable exploit might permit the attacker to execute arbitrary instructions on the underlying working system with the privileges of the online providers person,” Cisco mentioned. “With entry to the underlying working system, the attacker might additionally set up root entry on the affected machine,” it warned.

SAP

SAP has issued 10 new safety fixes as a part of its January Safety Patch Day, which incorporates a number of points with a CVSS rating of 9.1. CVE-2023-49583 is an escalation-of-privilege challenge in functions developed by SAP Enterprise Software Studio, SAP Internet IDE Full-Stack, and SAP Internet IDE for SAP HANA.

In the meantime, CVE-2023-50422 and CVE-2023-49583 are escalation-of-privilege points in SAP Edge Integration Cell.

One other notable flaw is CVE-2024-21737, a code injection vulnerability in SAP Software Interface Framework, which has a CVSS rating of 8.4. “A weak perform module of the applying permits an attacker to traverse by varied layers and execute OS instructions instantly,” safety agency Onapsis mentioned. “Profitable exploits could cause appreciable affect on confidentiality, integrity, and availability of the applying.”

[ad_2]