Need cloud computing? Get started now

Akamai’s Perspective on October’s Patch Tuesday 2024

 This month, there are 117 total CVEs across 60 different components. Of those, three are critical.
This month, there are 117 total CVEs across 60 different components. Of those, three are critical.

Spooky scary vulnerabilities, send shivers down your (server) stack 𝅘𝅥𝅮
Shrieking CVEs will shock your corp, seal your nets tonight 🎵

It’s a new month and we’ve got a big bowlful of CVEs — but, unlike candy, we can’t hand them out to costumed kids. This month, there are 117 total CVEs across 60 different components. Of those, three are critical, two were seen in the wild, and one was found by us.

In this blog post, we’ll assess how critical the vulnerabilities are, and how commonplace the affected applications and services are, to provide you with a realistic perspective on the bugs that were fixed. Be on the lookout for these insights in the days after every Patch Tuesday.

This is an ongoing report and we’ll add more information to it as our research progresses — stay tuned!

This month, we’re focusing on the following areas in which bugs were patched:

Vulnerabilities discovered in the wild

CVE-2024-43572 — Microsoft Management Console (CVSS 7.8)

The Microsoft Management Console (mmc.exe) is a graphical interface for various components.

The Windows Event Viewer, Services Manager, Task Scheduler are all implemented as snap-ins for the Microsoft Management Console, among many others.

Snap-ins themselves are also files with the .msc extension, which tell the Management Console what to display and which capabilities to offer. (So, when you’re running the Event Viewer, for example, you’re actually running mmc.exe eventvwr.msc behind the scenes).

The vulnerability appears to be associated with loading untrusted .msc files. Some improper handling probably leads to a remote code execution (RCE). Of course, “remote” in this case refers to the distance between the attacker and victim. The victim would have to download and open a malicious .msc to trigger the vulnerability. In addition to fixing the RCE, this month’s patch also includes a fix that prevents untrusted .msc from being loaded.

CVE-2024-43573 — Windows MSHTML Platform (CVSS 6.5)

MSHTML is a web page renderer for the Windows operating system. It exposes a Component Object Model (COM) interface to allow programs to add web-rendering capabilities. It is used by Internet Explorer, Microsoft Edge’s Internet Explorer mode, Microsoft Outlook, and various other programs.

There have been multiple vulnerabilities found in the MSHTML platform in the past (including some found by Akamai researchers), and it is an attractive exploitation target for attackers because of its ability to circumvent defense mechanisms and the fact that it is a built-in feature in Windows.

Vulnerabilities discovered by Akamai researchers

CVE-2024-43532 — Remote Registry Service (CVSS 8.8)

The Remote Registry Service in Windows allows for interaction with the Windows Registry between remote computers, and is implemented over the Remote Procedure Call (RPC) protocol. CVE-2024-43532 was found by Akamai researcher Stiv Kupchik and disclosed in February 2024.

The vulnerability actually exists in the client side of the Remote Registry RPC implementation, in the functions RegConnectRegistry and RegConnectRegistryEx. The root cause is a fallback mechanism in RPC transports. Although the Remote Registry traffic is usually handled over SMB named pipes, the client implementation contains a fallback mechanism to TCP in case the named pipe isn’t available. And unlike the SMB traffic, which uses secure authentication and encryption, the TCP traffic authenticates without integrity checks or encryption, which makes it vulnerable to NTLM relay attacks.

We’re presenting this vulnerability at the 2024 No Hat conference, so either visit the conference to hear it live, or read the accompanying blog post that we’ll release after the event.

Microsoft Configuration Manager

The Microsoft Configuration Manager is part of the Intune software family and is meant to help IT managers configure and manage a large number of Windows computers and servers.

There are multiple components in a Configuration Manager setup, but the one we’re interested in is its SQL database. According to CVE-2024-43468’s notes and its weakness ID, successful exploitation of the vulnerability allows running commands on its database (and, in the case of a monolith, single-server installation, on the main Configuration Manager server, as well).

Because there are patches for both the Configuration Manager and its console application, the issue is likely that the values that you input to the server aren’t sanitized or validated before being passed to the database (rather than an issue with the security of the database itself). As such, simply securing the database via segmentation isn’t likely to reduce the impact of this vulnerability, although it’s a good security measure nonetheless.

It might be possible to detect Configuration Manager installations via the following osquery:

  SELECT display_name, status, start_type, path FROM services WHERE name='SMS_Executive’

Windows Remote Desktop

Windows Remote Desktop is used for remote desktop connection between Windows machines, over the Remote Desktop Protocol (RDP). There are multiple vulnerabilities this month across different components of Windows Remote Desktop, so we’ll discuss them all together.

The main one is, of course, CVE-2024-43582 — a critical RCE vulnerability on the server side service. An attacker “only” needs to connect to an RDP server, spam it with malformed packets, and win a race condition, which can then be leveraged for an RCE.

As RDP is very common in networks and since it can be used for lateral movement, we recommend creating policy rules that cover it. In our observations, 89% of networks had Windows RDP traffic, and 73% of networks had the traffic with no restrictions.

Restricting RDP access to user machines, or only to pre-authorized servers (like jump boxes), can greatly reduce the risk presented by these vulnerabilities. We covered some quick wins regarding RDP in our segmentation blog post. Regardless of policy, we recommend you patch as soon as possible.

Component

CVE number

CVSS score

Effect

Remote Desktop Protocol Server

CVE-2024-43582              

8.1

Remote code execution

Windows Remote Desktop Licensing Service

CVE-2024-38262

7.5

Remote Desktop Client

CVE-2024-43533

8.8

CVE-2024-43599

8.8

Windows Remote Desktop Services

CVE-2024-43456

4.8

Tampering

Previously covered services

Many CVEs in this month’s Patch Tuesday are for systems that we’ve already covered in the past. If you’re interested in our analysis of, or general recommendations for, those services, we encourage you to look at our previous perspectives on Patch Tuesday blog posts.

Service

CVE number

Effect

Required access

Windows Kerberos

CVE-2024-38129                                               

Elevation of privilege

Network, authenticated

CVE-2024-43547

Information disclosure

Network

Windows Routing and Remote Access Service

CVE-2024-38261

Remote code execution

Local, requires social engineering or phishing

CVE-2024-43608

Remote code execution

Network

CVE-2024-43607

CVE-2024-38265

CVE-2024-43453

CVE-2024-38212

CVE-2024-43549

CVE-2024-43564

CVE-2024-43589

CVE-2024-43592

CVE-2024-43593

CVE-2024-43611

Microsoft SharePoint

CVE-2024-43503

Elevation of privilege

Local

Microsoft WDAC OLE DB provider for SQL server

CVE-2024-43519

Remote code execution

Network

This summary provides an overview of our current understanding and our recommendations given the information available. Our review is ongoing and any information herein is subject to change. You can also visit us on X, formerly known as Twitter, for real-time updates.