Microsoft Patches Actively Exploited Zero-Day and 71 Security Flaws in December Update
The update addresses a critical elevation of privilege vulnerability and multiple remote code execution flaws across Windows 10, Windows 11, and server systems.
- Microsoft's December 2024 Patch Tuesday includes fixes for 72 vulnerabilities, with one actively exploited zero-day flaw (CVE-2024-49138) in the Windows Common Log File System Driver.
- The zero-day vulnerability allowed attackers to gain system-level privileges and was discovered by CrowdStrike's Advanced Research Team.
- The update also addresses 30 remote code execution vulnerabilities, 16 of which are rated as critical, including flaws in Windows Lightweight Directory Access Protocol (LDAP) and Microsoft Message Queuing (MSMQ).
- Microsoft has provided workarounds for certain vulnerabilities, such as blocking inbound RPCs from untrusted networks to mitigate LDAP-related risks.
- Users are urged to install the KB5048667, KB5048685, and KB5048652 updates for Windows 11 and Windows 10 to secure their systems against these threats.