Active exploitation of 2 Microsoft zero-day vulnerabilities CVE-2024-49039 and CVE-2024-43451

Streamscan observes active exploits of 2 Microsoft zero-day vulnerabilities currently.

These are:

  • CVE-2024-49039 (score of 8.8/10): is a vulnerability in the Windows Task Scheduler which is  exploited to elevate privileges on targeted systems.

  • CVE-2024-43451 (score 7.8/10): is a vulnerability that allows attackers to elevate privileges on targeted Windows and Windows Server machines by disclosing the user's NTLMv2 hash, which contains authentication information.

 

Urgent action required

Microsoft has created patches for these vulnerabilities. Here are the links to download them:

More generally, we recommend that you apply the November 2024 Microsoft patches. They include patches for these 2 vulnerabilities as well as several other Microsoft vulnerabilities: https://msrc.microsoft.com/update-guide/releaseNote/2024-Nov

 

What Streamscan does to protect you

If you are a Streamscan partner :

  • We have set up a crisis unit to monitor the evolution of this critical vulnerability. We will apply the appropriate response measures.

  • Our DRG/MDR security monitoring team remains vigilant in monitoring your network.