Microsoft has issued a comprehensive security update addressing multiple critical vulnerabilities across Windows, Office, and Exchange Server platforms.
Microsoft Releases Critical Security Updates for 2024-03 Cumulative Rollup
Microsoft has released its March 2024 security updates, addressing 83 vulnerabilities across Windows operating systems, Microsoft Office, Exchange Server, and other enterprise products. The updates include fixes for two critical remote code execution flaws that could allow attackers to take complete control of affected systems.
Critical Vulnerabilities Addressed
The most severe issues patched this month include:
CVE-2024-21413 - Windows Common Log File System Driver Elevation of Privilege
- CVSS Score: 7.8
- Affects: Windows 10, Windows 11, Windows Server 2019/2022
- Impact: Local attackers could gain SYSTEM privileges
CVE-2024-21412 - Windows Kernel Elevation of Privilege
- CVSS Score: 7.8
- Affects: All supported Windows versions
- Impact: Allows malware to disable security features
CVE-2024-21410 - Microsoft Exchange Server Remote Code Execution
- CVSS Score: 9.1 (Critical)
- Affects: Exchange Server 2016/2019
- Impact: Attackers could execute code with SYSTEM privileges
Affected Products and Versions
Windows Operating Systems
- Windows 10 (all versions)
- Windows 11 (all versions)
- Windows Server 2019/2022
- Windows 7 SP1 (Extended Security Updates)
Microsoft Office
- Office 2016/2019/2021
- Microsoft 365 Apps for Enterprise
- Office Web Apps
Server Applications
- Exchange Server 2016/2019
- SharePoint Server
- SQL Server
Immediate Actions Required
Administrators should prioritize patching systems in this order:
- Internet-facing Exchange servers
- Domain controllers and critical infrastructure
- Windows servers hosting business applications
- Client workstations
Update Deployment Options:
- Windows Update: Automatic for most consumer systems
- WSUS/Configuration Manager: Available for enterprise environments
- Microsoft Update Catalog: Standalone packages for manual installation
Known Issues
Microsoft has identified several known issues with this month's updates:
- KB5034441 may cause printing failures on certain HP printer models
- Exchange Server updates require restart of Information Store service
- Office updates may conflict with older third-party add-ins
Timeline and Threat Intelligence
Microsoft reports active exploitation of CVE-2024-21410 in limited, targeted attacks primarily against financial sector organizations in Europe. The company has not observed widespread exploitation of other patched vulnerabilities.
Exploitation Status:
- CVE-2024-21410: Actively exploited (limited)
- CVE-2024-21413: Proof-of-concept code available
- Remaining vulnerabilities: No known exploitation
Verification and Validation
After applying updates, administrators should:
- Verify patch installation using
wmic qfe list - Test critical business applications
- Monitor security event logs for unusual activity
- Confirm Windows Defender signatures are current
Additional Resources
Future Considerations
Microsoft has announced upcoming changes to its patch management strategy:
- Monthly quality updates will include cumulative rollups
- Security-only updates will be discontinued for Windows 10
- New testing framework for enterprise validation
The company recommends organizations review their patch management policies and ensure adequate testing environments before deploying critical updates to production systems.
Bottom Line: This month's updates address actively exploited vulnerabilities and should be applied immediately, with priority given to Exchange Server and domain infrastructure.
Comments
Please log in or register to join the discussion