Microsoft Monthly Security Update (January 2024)

Microsoft has released monthly security update for their products:

 

[Updated on 2025-02-05]

CVE-2024-29059 vulnerability is being actively exploited. An attacker can use the exposed ObjRef URI in Microsoft .NET Framework to execute a network attack and allows them to enable remote code execution.

 

Vulnerable ProductRisk LevelImpactsNotes
WindowsMedium Risk Medium RiskSecurity Restriction Bypass
Remote Code Execution
Elevation of Privilege
Information Disclosure
Spoofing
Denial of Service
 
Extended Security Updates (ESU)Medium Risk Medium RiskSecurity Restriction Bypass
Remote Code Execution
Elevation of Privilege
Information Disclosure
Denial of Service
Spoofing
 
Microsoft OfficeMedium Risk Medium RiskRemote Code Execution 
AzureMedium Risk Medium RiskRemote Code Execution
Denial of Service
 
MarinerMedium Risk Medium RiskRemote Code Execution 
Developer ToolsHigh Risk High Risk

Denial of Service
Security Restriction Bypass
Elevation of Privilege

Information Disclosure

CVE-2024-29059 is being exploited in the wild. This  is a Microsoft .NET Framework information disclosure vulnerability that exposes the ObjRef URI to an attacker, ultimately enabling remote code execution.
SQL ServerMedium Risk Medium RiskSecurity Restriction Bypass 

 

Number of ‘Extremely High Risk’ product(s): 0

Number of ‘High Risk’ product(s): 1

Number of ‘Medium Risk’ product(s): 7

Number of ‘Low Risk’ product(s): 0

Evaluation of overall ‘Risk Level’: High Risk

RISK: High Risk

TYPE: Operating Systems – Windows OS

TYPE: Windows OS

Impact

  • Remote Code Execution
  • Security Restriction Bypass
  • Elevation of Privilege
  • Denial of Service
  • Information Disclosure
  • Spoofing

System / Technologies affected

  • Windows
  • Extended Security Updates (ESU)
  • Microsoft Office
  • Azure
  • Mariner
  • Developer Tools
  • SQL Server

Solutions

Before installation of the software, please visit the vendor web-site for more details.

  •  Apply fixes issued by the vendor.

Vulnerability Identifier


Source


Related Link

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.