Skip to main content

Microsoft Monthly Security Update (January 2024)

Last Update Date: 5 Feb 2025 Release Date: 10 Jan 2024 4682 Views

RISK: High Risk

TYPE: Operating Systems - Windows OS

TYPE: Windows OS

Microsoft has released monthly security update for their products:

 

[Updated on 2025-02-05]

CVE-2024-29059 vulnerability is being actively exploited. An attacker can use the exposed ObjRef URI in Microsoft .NET Framework to execute a network attack and allows them to enable remote code execution.

 

Vulnerable ProductRisk LevelImpactsNotes
WindowsMedium Risk Medium RiskSecurity Restriction Bypass
Remote Code Execution
Elevation of Privilege
Information Disclosure
Spoofing
Denial of Service
 
Extended Security Updates (ESU)Medium Risk Medium RiskSecurity Restriction Bypass
Remote Code Execution
Elevation of Privilege
Information Disclosure
Denial of Service
Spoofing
 
Microsoft OfficeMedium Risk Medium RiskRemote Code Execution 
AzureMedium Risk Medium RiskRemote Code Execution
Denial of Service
 
MarinerMedium Risk Medium RiskRemote Code Execution 
Developer ToolsHigh Risk High Risk

Denial of Service
Security Restriction Bypass
Elevation of Privilege

Information Disclosure

CVE-2024-29059 is being exploited in the wild. This  is a Microsoft .NET Framework information disclosure vulnerability that exposes the ObjRef URI to an attacker, ultimately enabling remote code execution.
SQL ServerMedium Risk Medium RiskSecurity Restriction Bypass 

 

Number of 'Extremely High Risk' product(s): 0

Number of 'High Risk' product(s): 1

Number of 'Medium Risk' product(s): 7

Number of 'Low Risk' product(s): 0

Evaluation of overall 'Risk Level': High Risk


Impact

  • Remote Code Execution
  • Security Restriction Bypass
  • Elevation of Privilege
  • Denial of Service
  • Information Disclosure
  • Spoofing

System / Technologies affected

  • Windows
  • Extended Security Updates (ESU)
  • Microsoft Office
  • Azure
  • Mariner
  • Developer Tools
  • SQL Server

Solutions

Before installation of the software, please visit the vendor web-site for more details.

  •  Apply fixes issued by the vendor.

Vulnerability Identifier


Source


Related Link