National Cyber Warfare Foundation (NCWF) Forums


Patch Tuesday - November 2024


0 user ratings
2024-11-12 22:45:16
milo
Red Team (CNA)
4 zero-days. AD CS ESC15 aka EKUwu; NTLMv2 disclosure; Exchange sender spoofing; task scheduler EoP. .NET & Kerberos critical RCEs. Welcome Server 2025.

Patch Tuesday - November 2024

Microsoft is addressing 90 vulnerabilities this November 2024 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation and/or public disclosure for four of the vulnerabilities published today, although as with last month’s batch, it does not evaluate any of these zero-day vulnerabilities as critical severity (yet). Of those four, Microsoft lists two as exploited in the wild, and both of these are now listed on CISA KEV. Microsoft is aware of some level of public disclosure for three. Microsoft is also patching two further critical remote code execution (RCE) vulnerabilities today. Two browser vulnerabilities have already been published separately this month, and are not included in the total.

Active Directory Certificate Service: zero-day EoP aka EKUwu

CVE-2024-49019 describes an elevation of privilege vulnerability in Active Directory Certificate Services. While the vulnerability only affects assets with the Windows Active Directory Certificate Services role, an attacker who successfully exploits this vulnerability could gain domain admin privileges, so that doesn’t offer much comfort. Unsurprisingly, given the potential prize for attackers, Microsoft assesses future exploitation as more likely. Vulnerable PKI environments are those which include published certificates created using a version 1 certificate template with the source of subject name set to "Supplied in the request" and Enroll permissions granted to a broader set of accounts. Microsoft does not obviously provide any means of determining the certificate template version used to create a certificate, although the advisory does offer recommendations for anyone hoping to secure certificate templates.

There is a significant history of research and exploitation of Active Directory Certificate Services, including the widely-discussed Certified Pre-Owned series, and the discovering researchers have now added further to that corpus, tagging CVE-2024-49019 as ESC15. In keeping with another long-standing infosec tradition, the researcher has provided a fun celebrity vulnerability name — in this case, EKUwu, a portmanteau of EKU (Extended Key Usage) and UwU, an emoticon representing a cute face — as part of their detailed and insightful write-up.

MSHTML: zero-day NTLMv2 hash disclosure

Given the CVSSv3 base score of 6.0, one might almost be forgiven for overlooking CVE-2024-43451, which describes an NTLM hash disclosure spoofing vulnerability in the MSHTML platform which powered Internet Explorer. However, public disclosure and in-the-wild exploitation are always worth a look. Although exploitation requires that the user interact with a malicious file, a successful attacker receives the user’s NTLMv2 hash, and can then use that to authenticate as the user.

Microsoft has arguably scored CVE-2024-43451 correctly according to the CVSSv3.1 specification. However, although the Microsoft CVSSv3 vector describes an impact only to confidentiality, if an attacker can authenticate as the user post-exploitation, a further potential for subsequent impact to integrity and availability now exists; if we take that potential indirect effect into account, the CVSSv3 base score would look more like 8.8, which is the sort of number where alarm bells typically start ringing for many defenders. As a further sting in the tail, the advisory FAQ describes the required user interaction as minimal: left click, right click, or even the highly non-specific “performing an action other than opening or executing [the file]”. There’s certainly the potential for a long tail of exploitation here, especially in environments with more relaxed patching cadence.

The complete Windows catalog from Server 2025 and Windows 11 24H2 all the way back to Server 2008 receives patches for CVE-2024-43451. As Rapid7 has previously noted, MSHTML (also known as Trident) is still fully present in Windows — and unpatched assets are thus vulnerable — regardless of whether or not a Windows asset has Internet Explorer 11 disabled.

Exchange: zero-day sender spoofing

It’s been a few months since we’ve seen any security patches for Exchange, but the streak is now broken with a zero-day vulnerability. Mailserver admins should be paying attention to CVE-2024-49040, which is a publicly disclosed spoofing vulnerability. The specific weakness is CWE-451: User Interface (UI) Misrepresentation of Critical Information, which is often associated with phishing attacks, as well as browser vulnerabilities, and can describe a wide range of misdeeds, from visual truncation and UI overlay to homograph abuse. Microsoft does not yet claim knowledge of in-the-wild exploitation.

The advisory for CVE-2024-49040 hints that post-patching actions may be required for remediation of CVE-2024-49040, and links to further information in a separate article titled “Exchange Server non-RFC compliant P2 FROM header detection”. A careful read of the article doesn’t appear to list any mandatory post-patching actions; instead, there is an optional extra mitigation strategy action around Exchange Transport Rules, as well as an encouragingly detailed explanation of the protection offered by today’s patches. The article showcases that an Exchange-connected email client such as Outlook might display a forged sender as if it were legitimate, which we can all agree is not a good outcome. Attackers don’t have to look far to find other vulnerabilities to chain with this one, since today’s sibling zero-day vulnerability CVE-2024-43451 is certainly an option. On the other hand, let’s take a moment to appreciate the Exchange team’s blog title: “You Had Me at EHLO”.

Patches for CVE-2024-49040 are available for Exchange 2019 CU13 and CU14, as well as Exchange 2016 CU23. It’s worth remembering that both Exchange 2016 and 2019 have an extended end date of 2025-10-14, which is now less than a year away; this despite the fact that the successor for 2016 and 2019, which Microsoft is unsubtly branding as Exchange Server Subscription Edition, isn’t due for release until early in 2025 Q3. Many admins would no doubt prefer a longer upgrade window.

The researcher who reported CVE-2024-49040 also discovered a means to impersonate Microsoft corporate email accounts earlier this year, but went public with his findings after Microsoft dismissed his report; it appears that the relationship has been at least somewhat repaired.

Task Scheduler: zero-day EoP (but not SYSTEM)

Windows Task Scheduler facilitates all sorts of useful outcomes, and if you’re a threat actor, it now offers one more: elevation of privilege via CVE-2024-49039. Microsoft is aware of exploitation in the wild. Given the low attack complexity and low privileges requirement, no requirement for user interaction, high impact across the CIA triad, and changed scope, it’s no surprise that the CVSSv3 base score comes out as a relatively zesty 8.8. However, Windows elevation of privilege vulnerabilities are always most exciting for attackers when they lead directly to SYSTEM privileges, but that’s not the case here. The attacker in this scenario starts out in a low-privileged AppContainer sandbox, and exploitation via a malicious app provides medium integrity level privileges, which is the same as a regular non-administrative user on the system. Still, every step forward for a threat actor is a step back for defenders.

.NET: critical RCE

This month brings patches for CVE-2024-43498, a critical RCE in .NET 9.0 with a CVSSv3 base score of 9.8, which is so seldom a harbinger of good news. Exploitation might mean compromise of a desktop application by loading a malicious file, but most concerningly could also describe RCE in the context of a vulnerable .NET webapp via a specially crafted request. Microsoft assesses exploitation as less likely, but there’s nothing on the advisory which obviously supports that assessment, since this is a low-complexity network attack which requires neither privileges nor user interaction. CVE-2024-43498 is surely worthy of immediate patching. It’s also never a bad idea to review other options for protection, especially for internet-exposed services.

Kerberos: critical RCE

The advisory for CVE-2024-43639 describes a critical RCE in Kerberos with a CVSSv3 base score of 89.8, although not in great detail. The FAQ explains that an unauthenticated attacker could use a specially crafted application to leverage a cryptographic protocol vulnerability in Windows Kerberos to perform remote code execution against the target, but without providing much information about the target or the precise context of code execution. The only safe assumption here is that code execution is in a highly-privileged context on a server which handles key authentication tasks. Patch accordingly.

Microsoft lifecycle update

In Microsoft lifecycle news, the most notable change is the arrival of Windows Server 2025 as a General Availability product at the start of November. Microsoft has announced a number of new features in Server 2025, which we will look forward to discussing in more detail in future editions of this blog.

At the other end of the lifecycle continuum, .NET 6.0 receives its final scheduled updates today; as .NET 6.0 is/was a Long Term Support (LTS) version, and .NET 7.0 is already beyond end of life, the only current upgrade path is to .NET 8.0.

Summary charts

Patch Tuesday - November 2024
Patch Tuesday - November 2024
Patch Tuesday - November 2024
SQL server dominating the heatmap, but it's mostly a group of closely-related client vulns.

Summary tables

Apps vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-49051Microsoft PC Manager Elevation of Privilege VulnerabilityNoNo7.8

Azure vulnerabilities










































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-43602Azure CycleCloud Remote Code Execution VulnerabilityNoNo9.9
CVE-2024-49056Airlift.microsoft.com Elevation of Privilege VulnerabilityNoNo7.3
CVE-2024-49042Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege VulnerabilityNoNo7.2
CVE-2024-43613Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege VulnerabilityNoNo7.2

Browser vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-10827Chromium: CVE-2024-10827 Use after free in SerialNoNoN/A
CVE-2024-10826Chromium: CVE-2024-10826 Use after free in Family ExperiencesNoNoN/A

Developer Tools vulnerabilities

















































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-43498.NET and Visual Studio Remote Code Execution VulnerabilityNoNo9.8
CVE-2024-49050Visual Studio Code Python Extension Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-43499.NET and Visual Studio Denial of Service VulnerabilityNoNo7.5
CVE-2024-49049Visual Studio Code Remote Extension Elevation of Privilege VulnerabilityNoNo7.1
CVE-2024-49044Visual Studio Elevation of Privilege VulnerabilityNoNo6.7

ESU Windows vulnerabilities















































































































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-43639Windows Kerberos Remote Code Execution VulnerabilityNoNo9.8
CVE-2024-43627Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-43628Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-43620Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-43621Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-43622Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-43635Windows Telephony Service Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49046Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-43626Windows Telephony Service Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-43641Windows Registry Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-43623Windows NT OS Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-43644Windows Client-Side Caching Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-43636Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-49019Active Directory Certificate Services Elevation of Privilege VulnerabilityNoYes7.8
CVE-2024-43452Windows Registry Elevation of Privilege VulnerabilityNoNo7.5
CVE-2024-43450Windows DNS Spoofing VulnerabilityNoNo7.5
CVE-2024-43634Windows USB Video Class System Driver Elevation of Privilege VulnerabilityNoNo6.8
CVE-2024-43637Windows USB Video Class System Driver Elevation of Privilege VulnerabilityNoNo6.8
CVE-2024-43638Windows USB Video Class System Driver Elevation of Privilege VulnerabilityNoNo6.8
CVE-2024-43643Windows USB Video Class System Driver Elevation of Privilege VulnerabilityNoNo6.8
CVE-2024-43449Windows USB Video Class System Driver Elevation of Privilege VulnerabilityNoNo6.8
CVE-2024-43451NTLM Hash Disclosure Spoofing VulnerabilityYesYes6.5
CVE-2024-38203Windows Package Library Manager Information Disclosure VulnerabilityNoNo6.2

Mariner System Center vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-5535OpenSSL: CVE-2024-5535 SSL_select_next_proto buffer overreadNoNo9.1

Microsoft Office vulnerabilities






































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-49031Microsoft Office Graphics Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-49032Microsoft Office Graphics Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-49026Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-49027Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-49028Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-49029Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-49030Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-49033Microsoft Word Security Feature Bypass VulnerabilityNoNo7.5

Open Source Software vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-49048TorchGeo Remote Code Execution VulnerabilityNoNo8.1
CVE-2024-43598LightGBM Remote Code Execution VulnerabilityNoNo7.5

SQL Server vulnerabilities







































































































































































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-38255SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-43459SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-43462SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-48994SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-48995SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-48996SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-48993SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-48997SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-48998SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-48999SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49000SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49001SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49002SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49003SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49004SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49005SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49007SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49006SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49008SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49009SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49010SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49011SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49012SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49013SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49014SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49015SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49016SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49017SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49018SQL Server Native Client Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-49043Microsoft.SqlServer.XEvent.Configuration.dll Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-49021Microsoft SQL Server Remote Code Execution VulnerabilityNoNo7.8

Server Software vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-49040Microsoft Exchange Server Spoofing VulnerabilityNoYes7.5

Windows vulnerabilities
















































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-49039Windows Task Scheduler Elevation of Privilege VulnerabilityYesNo8.8
CVE-2024-43624Windows Hyper-V Shared Virtual Disk Elevation of Privilege VulnerabilityNoNo8.8
CVE-2024-43447Windows SMBv3 Server Remote Code Execution VulnerabilityNoNo8.1
CVE-2024-43625Microsoft Windows VMSwitch Elevation of Privilege VulnerabilityNoNo8.1
CVE-2024-43530Windows Update Stack Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-43640Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-43630Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-43629Windows DWM Core Library Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-43642Windows SMB Denial of Service VulnerabilityNoNo7.5
CVE-2024-43631Windows Secure Kernel Mode Elevation of Privilege VulnerabilityNoNo6.7
CVE-2024-43646Windows Secure Kernel Mode Elevation of Privilege VulnerabilityNoNo6.7
CVE-2024-43645Windows Defender Application Control (WDAC) Security Feature Bypass VulnerabilityNoNo6.7
CVE-2024-43633Windows Hyper-V Denial of Service VulnerabilityNoNo6.5
CVE-2024-38264Microsoft Virtual Hard Disk (VHDX) Denial of Service VulnerabilityNoNo5.9



Source: Rapid7
Source Link: https://blog.rapid7.com/2024/11/12/patch-tuesday-november-2024/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.