Skip to content

Search the site

Microsoft patches a brace of exploited zero days

Redmond pushes fixes for 117 vulnerabilities, three rated critical, five as publicly known , and eight marked as “exploitation more likely.” Beyond Microsoft, there are...

Microsoft has patched a brace of zero days that are under active attack.

CVE-2024-43573 and CVE-2024-43572 both only get a “moderate” rating but are listed as exploited – with Redmond, as is now customary, giving no detail on the scale of exploitation in its October Patch Tuesday notes. 

It pushed fixes for a total of 117 vulnerabilities, three rated critical, five as publicly known , and eight marked as “exploitation more likely.”

From the Zero Day Initiative to your security partner, plenty of folks in the ecosystem will have detailed breakdowns; do the dutiful.

October Patch Tuesday: What else?

Back in early 2023 The Stack analysed 90,000+ CVES over the five years from 2018-2022, identifying a sharp rise in cross-site scripting, memory corruption, and SQL injection bugs.

Others also pushed large updates, with Adobe pushing nine patch packages fixing 52 CVEs, none listed as known exploited. 

As Action1 notes, other recent major security fixes to be aware of include:

SAP also issued security fixes, including an update to security note #3479478 that patches a CVSS 9.8 “missing authentication check vulnerability in SAP BusinessObjects Business Intelligence Platform” first fixed in August; it now includes a patch for customers on different servers.

Latest