Table of Contents
  • Home
  • /
  • Blog
  • /
  • Breaking Down the Latest December 2024 Patch Tuesday Report
December 11, 2024
|
16m

Breaking Down the Latest December 2024 Patch Tuesday Report


Microsoft December 2024 Patch Tuesday Fixes 73 Vulnerabilities

Microsoft has wrapped up 2024 by addressing 73 vulnerabilities in its December Patch Tuesday security updates. This release includes fixes for one actively exploited zero-day vulnerability, with 16 flaws rated as Critical and 54 as Important severity across Windows, Office, Dynamics, Azure, and other products.

Among the highlights is an actively exploited zero-day vulnerability (CVE-2024-49138) in the Windows Common Log File System Driver that could allow attackers to gain SYSTEM privileges. The critical vulnerabilities include multiple remote code execution flaws affecting Windows Remote Desktop Services, Windows LDAP, LSASS, Message Queuing, and Hyper-V components.

This month also sees patches for key products including Windows Server, Microsoft Office, SharePoint, Exchange Server, Azure, and Dynamics 365. Notable fixes address remote code execution vulnerabilities in Office, information disclosure in Windows components, and multiple elevation of privilege flaws across the Windows ecosystem.

In this monthly report, we'll analyze the zero-day threat along with other critical security issues addressed. Our analysis covers severity ratings, exploitation vectors, and remediation guidance to help prioritize patching. Whether you manage Windows clients, servers, or cloud services, applying these final security updates helps secure environments as 2024 comes to a close.

Key Highlights - Patch Tuesday December 2024

In December's Patch Tuesday, Microsoft addressed 73 flaws, including one actively exploited zero-day vulnerability. This update included patches across categories like elevation of privilege, remote code execution, spoofing, denial of service, and information disclosure vulnerabilities.

The key affected products in this release span across Microsoft's product range, including Windows, Office, Exchange Server, Azure, Dynamics, and others. It is crucial for administrators and end users to apply these security updates promptly to protect their systems from these vulnerabilities.

Key Highlights are:

  1. Total Flaws and Zero-Day Vulnerability: This update resolves 73 total bugs, with 16 critical and 54 important severity vulnerabilities. One actively exploited zero-day vulnerability (CVE-2024-49138) affecting the Windows Common Log File System Driver was patched.

  2. Critical Flaws: Among the patches, sixteen critical flaws were fixed, all being remote code execution vulnerabilities, including issues in Windows LDAP, LSASS, Message Queuing, and Hyper-V.

  3. Vulnerability Types: The vulnerabilities addressed include 30 Remote Code Execution vulnerabilities, 27 Elevation of Privilege vulnerabilities, 7 Information Disclosure vulnerabilities, 5 Denial of Service vulnerabilities, and 1 Spoofing vulnerability.

  4. Zero-Day Threat: The actively exploited zero-day allows attackers to gain SYSTEM privileges through the Windows Common Log File System Driver. CrowdStrike's Advanced Research Team discovered this vulnerability.

  5. Critical-Rated Bugs: Notable critical bugs include remote code execution vulnerabilities in Windows Remote Desktop Services, Windows LDAP client and server components, LSASS, Message Queuing (MSMQ), and a Hyper-V container escape vulnerability.

  6. Non-Critical Notables: Other major issues include remote code execution vulnerabilities in Office related to FBX 3D model files, SharePoint server, ODBC driver, and privilege escalations in Windows Subsystem for Linux and the kernel.

Zero-day Vulnerabilities Patched in December 2024

One zero-day vulnerability was addressed in Microsoft's December Patch Tuesday release. This vulnerability is notable because it was being actively exploited in the wild prior to patches being made available.

CVE-2024-49138 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

Vulnerability type: Elevation of Privilege

Affected product: Windows Common Log File System Driver

CVSS v3 base score: 7.8

Severity rating: Important

The Common Log File System (CLFS) is a general-purpose logging service that can be used by software clients running in user or kernel mode. CLFS has applications in data management, database systems, messaging, Online Transactional Processing (OLTP) systems, and other types of transactional systems.

The vulnerability allows attackers to gain SYSTEM privileges on Windows devices. While Microsoft has not released detailed information about how the flaw was exploited in attacks, the weakness is classified as CWE-122: Heap-based Buffer Overflow, which typically leads to crashes or denial of service but can also enable code execution.

This marks the first CLFS zero-day vulnerability Microsoft has published in 2024, following a series of similar CLFS zero-days in recent years including CVE-2022-24521, CVE-2023-23376, CVE-2022-37969, and CVE-2023-28252. The vulnerability was discovered by the Advanced Research Team at CrowdStrike.

CISA has added CVE-2024-49138 to its Known Exploited Vulnerabilities Catalog and has requested organizations to patch it before December 31, 2024.

The persistent discovery of zero-day vulnerabilities in CLFS suggests that unless Microsoft performs a complete replacement of the aging CLFS codebase rather than implementing specific fixes, more such vulnerabilities may emerge in the future. Patches are available for all supported versions of Windows.

Based on the information from the documents, here's a summary table of the zero-day vulnerability reported in December 2024:

CVE ID
Description
Exploited?
Publicly disclosed?
CVSSv3 Score
CVE-2024-49138
Windows Common Log File System Driver Elevation of Privilege VulnerabilitySmall header
Yes
Yes
7.8

Critical Vulnerabilities Patched in December 2024

Among the 73 vulnerabilities patched this month, 16 were rated as Critical, all being remote code execution vulnerabilities. Let's examine the most significant critical flaws:

CVE-2024-49117 - Windows Hyper-V Remote Code Execution Vulnerability

Vulnerability type: Remote Code Execution

Affected product: Windows Hyper-V

CVSS v3 base score: 8.8

Severity rating: Critical

Windows Hyper-V is a Microsoft virtualization technology that allows users to create and run Virtual Machines (VMs) on a physical host. An authenticated attacker on a guest VM must send specially crafted file operation requests to hardware resources on the VM to exploit the vulnerability. Successful exploitation could result in a cross-VM attack, compromising multiple virtual machines and expanding the attack's impact beyond the initially targeted VM.

CVE-2024-49124 - Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability

Vulnerability type: Remote Code Execution

Affected product: LDAP Client

CVSS v3 base score: 8.1

Severity rating: Critical

An unauthenticated attacker must win a race condition and send a specially crafted request to a vulnerable server to exploit this vulnerability. The LDAP protocol operates above the TCP/IP stack and helps connect, browse, and edit online directories. Successful exploitation could allow an attacker to execute code in the context of the SYSTEM account.

CVE-2024-49126 - Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability

Vulnerability type: Remote Code Execution

Affected product: Windows LSASS

CVSS v3 base score: 8.1

Severity rating: Critical

LSASS is responsible for enforcing security policy on Windows systems, handling tasks such as user authentication and password changes. An unauthenticated attacker must win a race condition to exploit the vulnerability. Successful exploitation could result in remote code execution in the context of the server's account through a network call.

CVE-2024-49122 & CVE-2024-49118 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

Vulnerability type: Remote Code Execution

Affected product: Microsoft Message Queuing

CVSS v3 base score: 8.1

Severity rating: Critical

These vulnerabilities affect the Message Queuing protocol, which ensures reliable communication between Windows computers across different networks. To exploit these vulnerabilities, an attacker must send a malicious MSMQ packet to an MSMQ server. Successful exploitation could enable remote code execution on the server side.

CVE-2024-49112, CVE-2024-49127 - Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerabilities

Vulnerability type: Remote Code Execution

Affected product: Windows LDAP

CVSS v3 base score: 9.8, 8.1

Severity rating: Critical

These critical vulnerabilities in Windows LDAP could allow an unauthenticated attacker to execute arbitrary code by sending specially crafted LDAP calls. Successful exploitation could result in code execution within the context of the SYSTEM account.

Windows Remote Desktop Services Remote Code Execution Vulnerabilities

Nine critical remote code execution vulnerabilities were patched in Windows Remote Desktop Services (CVE-2024-49106, CVE-2024-49108, CVE-2024-49115, CVE-2024-49116, CVE-2024-49119, CVE-2024-49120, CVE-2024-49123, CVE-2024-49128, & CVE-2024-49132). These vulnerabilities could allow an attacker to perform remote code execution by connecting to a system with the Remote Desktop Gateway role and triggering a race condition to create a use-after-free scenario.

Based on the information from the documents, here's a summary table of the critical vulnerabilities reported in December 2024:

CVE ID
Description
CVSS Score
Severity
CVE-2024-49112
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
9.8
Critical
CVE-2024-49117
Windows Hyper-V Remote Code Execution Vulnerability
8.8
Critical
CVE-2024-49124
Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49126
Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49122
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49118
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49127
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49106
Windows Remote Desktop Services Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49108
Windows Remote Desktop Services Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49115
Windows Remote Desktop Services Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49116
Windows Remote Desktop Services Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49119
Windows Remote Desktop Services Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49120
Windows Remote Desktop Services Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49123
Windows Remote Desktop Services Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49128
Windows Remote Desktop Services Remote Code Execution Vulnerability
8.1
Critical
CVE-2024-49132
Windows Remote Desktop Services Remote Code Execution Vulnerability
8.1
Critical

Vulnerabilities by Category

In total, 73 vulnerabilities were addressed in December's Patch Tuesday. Remote Code Execution flaws top the list with 30 patches, followed by Elevation of Privilege with 27 vulnerabilities. The rest consist of 7 Information Disclosure, 5 Denial of Service, and 1 Spoofing vulnerability.

Here is the breakdown of the categories patched this month:

  1. Remote Code Execution – 30

  2. Elevation of Privilege - 27

  3. Information Disclosure – 7

  4. Denial of Service – 5

  5. Spoofing – 1

The table below shows the CVE IDs mapped to these vulnerability types from Microsoft's December 2024 Patch Tuesday:

Vulnerability Category
CVE IDs
Remote Code Execution
CVE-2024-49117, CVE-2024-49124, CVE-2024-49126, CVE-2024-49122, CVE-2024-49118, CVE-2024-49112, CVE-2024-49127, CVE-2024-49106, CVE-2024-49108, CVE-2024-49115, CVE-2024-49116, CVE-2024-49119, CVE-2024-49120, CVE-2024-49123, CVE-2024-49128, CVE-2024-49132, CVE-2024-49085, CVE-2024-49086, CVE-2024-49102, CVE-2024-49104, CVE-2024-49125, CVE-2024-49080, CVE-2024-49089, CVE-2024-49091, CVE-2024-49070, CVE-2024-49069, CVE-2024-49142, CVE-2024-49065, CVE-2024-49063, CVE-2024-49079
Elevation of Privilege
CVE-2024-49138, CVE-2024-49093, CVE-2024-49114, CVE-2024-49088, CVE-2024-49090, CVE-2024-49084, CVE-2024-49072, CVE-2024-49076, CVE-2024-49074, CVE-2024-49107, CVE-2024-49097, CVE-2024-49095, CVE-2024-49073, CVE-2024-49092, CVE-2024-49077, CVE-2024-49078, CVE-2024-49083, CVE-2024-49110, CVE-2024-49094, CVE-2024-49101, CVE-2024-49111, CVE-2024-49081, CVE-2024-49109, CVE-2024-49059, CVE-2024-43600, CVE-2024-49068, CVE-2024-43594
Information Disclosure
CVE-2024-49082, CVE-2024-49087, CVE-2024-49098, CVE-2024-49099, CVE-2024-49103, CVE-2024-49064, CVE-2024-49062
Denial of Service
CVE-2024-49129, CVE-2024-49121, CVE-2024-49113, CVE-2024-49096, CVE-2024-49075
Spoofing
CVE-2024-49041

List of Products Patched in December 2024 Patch Tuesday Report

Microsoft's December 2024 Patch Tuesday includes updates for a broad range of its products, applications, and services. Here are the applications and product components that have received patches:

Product Name
No. of Vulnerabilities Patched
Windows
16
Windows Remote Desktop Services
11
Windows Wireless Wide Area Network Service
8
Windows Mobile Broadband
7
Windows LDAP - Lightweight Directory Access Protocol
5
Windows Routing and Remote Access Service (RRAS)
6
Microsoft Office
4
Windows Message Queuing
3
Microsoft Office SharePoint
4
Windows Common Log File System Driver
3
Azure
2
Windows Kernel
2
Windows PrintWorkflowUserSvc
2
Microsoft Edge (Chromium-based)
2
Windows Hyper-V
1
Microsoft SharePoint Server
1
Microsoft ODBC Driver
1
Microsoft Bluetooth Driver
1
Windows Resilient File System (ReFS)
1
Windows Subsystem for Linux
1
Windows File Explorer
1
Windows Task Scheduler
1
Windows Local Security Authority Subsystem Service (LSASS)
1
WmsRepair Service
1
System Center Operations Manager
1

Complete List of Vulnerabilities Patched in December 2024 Patch Tuesday.

Download the complete list of vulnerabilities by products patched in December 2024 Patch Tuesday here. 

Browser vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
Microsoft Edge (Chromium-based) Spoofing Vulnerability
No
No
4.3
Chromium: CVE-2024-12053 Type Confusion in V8
No
No
N/A

Developer Tools vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
Microsoft/Muzic Remote Code Execution Vulnerability
No
No
8.4

Microsoft Office vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
Microsoft SharePoint Elevation of Privilege Vulnerability
No
No
8.2
Microsoft Office Elevation of Privilege Vulnerability
No
No
7.8
Microsoft Excel Remote Code Execution Vulnerability
No
No
7.8
Microsoft Access Remote Code Execution Vulnerability
No
No
7.8
Microsoft SharePoint Remote Code Execution Vulnerability
No
No
7.4
Microsoft Office Elevation of Privilege Vulnerability
No
No
7
Microsoft SharePoint Information Disclosure Vulnerability
No
No
6.5
Microsoft SharePoint Information Disclosure Vulnerability
No
No
6.5
Microsoft Office Remote Code Execution Vulnerability
No
No
5.5

System Center vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
Microsoft Defender for Endpoint on Android Spoofing Vulnerability
No
No
8.1
System Center Operations Manager Elevation of Privilege Vulnerability
No
No
7.3

Windows vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
No
No
8.8
Windows Hyper-V Remote Code Execution Vulnerability
No
No
8.8
Windows Remote Desktop Services Remote Code Execution Vulnerability
No
No
8.1
Windows Remote Desktop Services Remote Code Execution Vulnerability
No
No
8.1
Windows Remote Desktop Services Remote Code Execution Vulnerability
No
No
8.1
Windows Remote Desktop Services Remote Code Execution Vulnerability
No
No
8.1
Windows Remote Desktop Services Remote Code Execution Vulnerability
No
No
8.1
Windows Remote Desktop Services Remote Code Execution Vulnerability
No
No
8.1
Windows Remote Desktop Services Remote Code Execution Vulnerability
No
No
8.1
Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
No
No
7.8
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
No
No
7.8
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
No
No
7.8
Windows Remote Desktop Services Denial of Service Vulnerability
No
No
7.5
WmsRepair Service Elevation of Privilege Vulnerability
No
No
7.3
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
No
No
7
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
No
No
7
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
No
No
6.8
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
No
No
6.8
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
No
No
6.8
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
No
No
6.8
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
No
No
6.8
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
No
No
6.8
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
No
No
6.6
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
No
No
6.6
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
No
No
6.6
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
No
No
6.6
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
No
No
6.6
Windows Mobile Broadband Driver Information Disclosure Vulnerability
No
No
4.6
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
No
No
4.3
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
No
No
4.3
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
No
No
4.3

Windows ESU vulnerabilities

CVE
Title
Exploited?
Publicly disclosed?
CVSSv3 base score
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
No
No
9.8
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
No
No
8.8
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
No
No
8.8
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
No
No
8.8
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
No
No
8.8
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
No
No
8.8
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
No
No
8.8
Windows Remote Desktop Services Remote Code Execution Vulnerability
No
No
8.1
Windows Remote Desktop Services Remote Code Execution Vulnerability
No
No
8.1
Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
No
No
8.1
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
No
No
8.1
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
No
No
8.1
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
No
No
8.1
Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
No
No
8.1
Windows Task Scheduler Elevation of Privilege Vulnerability
No
No
7.8
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Yes
Yes
7.8
Windows Common Log File System Driver Elevation of Privilege Vulnerability
No
No
7.8
Windows Common Log File System Driver Elevation of Privilege Vulnerability
No
No
7.8
Input Method Editor (IME) Remote Code Execution Vulnerability
No
No
7.8
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
No
No
7.5
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
No
No
7.5
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
No
No
7.5
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
No
No
7.5
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
No
No
7.2
Windows Domain Name Service Remote Code Execution Vulnerability
No
No
7.2
Windows Kernel Elevation of Privilege Vulnerability
No
No
7
Windows File Explorer Information Disclosure Vulnerability
No
No
6.8

Bottom Line

Microsoft's December 2024 Patch Tuesday addressed 73 vulnerabilities, including one actively exploited zero-day flaw that allows attackers to gain SYSTEM privileges on Windows devices.

This release fixed a variety of vulnerability types, with remote code execution flaws being most prevalent at 30 instances followed by elevation of privilege issues with 27 patches. Among the notable critical bugs are remote code execution vulnerabilities in Windows Remote Desktop Services, LDAP, LSASS, Message Queuing, and a Hyper-V container escape vulnerability.

The critical vulnerabilities addressed this month consist of:

  • CVE-2024-49112 - A critical Windows LDAP remote code execution vulnerability with a CVSS score of 9.8

  • CVE-2024-49117 - A Windows Hyper-V remote code execution vulnerability allowing VM escape

  • Nine critical RCE vulnerabilities in Windows Remote Desktop Services

  • Multiple critical remote code execution flaws in Message Queuing and LDAP components

The actively exploited zero-day vulnerability (CVE-2024-49138) in the Windows Common Log File System Driver represents an ongoing threat that administrators should prioritize patching.

In total, Microsoft addressed:

  • 16 Critical vulnerabilities

  • 54 Important vulnerabilities

  • 1 Actively exploited zero-day

  • 30 Remote Code Execution flaws

  • 27 Elevation of Privilege vulnerabilities

  • Multiple vulnerabilities affecting core Windows components and services

We aim to keep readers informed each month in our Patch Tuesday reports. Please follow our website thesecmaster.com or subscribe to our social media pages on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram to receive similar updates.

You may also like these articles:

Arun KL

Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.

Recently added

Report

View All

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe