Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Breaking Down Microsoft’s July 2024 Patch Tuesday: Zero-Days and New Features

    Breaking Down Microsoft’s July 2024 Patch Tuesday: Zero-Days and New Features

    July 10, 2024

    On the second Tuesday of July 2024, Microsoft Corporation issued its latest round of security updates, marking another Patch Tuesday update. This month’s release addresses a total of 139 vulnerabilities across various Microsoft products, including Windows operating systems and other software. Among these vulnerabilities, Microsoft has identified at least four zero-day exploits, underlining the critical nature of this update.

    Two of the zero-day vulnerabilities patched in July 2024 have been actively exploited in the wild, emphasizing the urgency of applying these updates promptly. One such vulnerability is CVE-2024-38080, affecting the Windows Hyper-V component found in both Windows 11 and Windows Server 2022. 

    This flaw allows attackers to elevate their privileges on a compromised system. Microsoft has confirmed active exploitation of this vulnerability but has not disclosed specific details regarding the attacks.

    Microsoft Patch Tuesday Fixes Zero-Day Vulnerabilities

    The 2023 Microsoft Patch Tuesday fixes several vulnerabilities existing within the Microsoft ecosystem. These vulnerabilities range from denial of service, elevation of privilege, and remote code execution.

    In a conversation with The Cyber Express, Satnam Narang, Senior Staff Research Engineer at Tenable, shared his opinions on Microsoft Patch Tuesday and the vulnerabilities associated with this update.

    “CVE-2024-38080 is an elevation of privilege flaw in Windows Hyper-V. A local, authenticated attacker could exploit this vulnerability to elevate privileges to the SYSTEM level following an initial compromise of a targeted system”, said Narang. 

    The second zero-day, CVE-2024-38112, targets MSHTML, Microsoft’s proprietary engine used in Internet Explorer. This vulnerability involves spoofing, where an attacker could deceive a user into opening a malicious file, leading to potential exploitation. Similar to CVE-2024-38080, Microsoft has acknowledged the exploitation of this vulnerability in the wild without providing specific details.

    Narang further commented on CVE-2024-38112, stating, “Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.”

    Microsoft’s July 2024 Patch Tuesday addresses a total of 139 vulnerabilities, including five critical ones known for their potential to allow remote code execution (RCE). These vulnerabilities cover a range of exploit categories, including 26 elevations of privilege issues, 24 security feature bypass vulnerabilities, 59 instances of remote code execution risks, 9 information disclosure flaws, 17 denial of service vulnerabilities, and 7 spoofing vulnerabilities. 

    Fixing Vulnerabilities and New Windows Enhancements

    Satnam Narang further provided valuable insights into the severity and implications of these vulnerabilities. Regarding the broader impact of such patches, Narang stated, “Since 2022, there have been 44 vulnerabilities in Windows Hyper-V, though this is the first one to have been exploited in the wild to our knowledge.” 

    He also highlighted another critical vulnerability, CVE-2024-38021, affecting Microsoft Office, which allows attackers to leak NTLM credentials. This flaw underscores ongoing challenges in securing Microsoft’s software suite against sophisticated cyber threats.

    In addition to the actively exploited zero-days, Microsoft’s July 2024 Patch Tuesday release addresses two other publicly disclosed vulnerabilities: CVE-2024-35264, a remote code execution flaw in .NET and Visual Studio, and CVE-2024-37985, a side-channel attack on Arm processors known as “FetchBench” that could compromise sensitive information. While these vulnerabilities were not actively exploited at the time of the patch release, they highlight the critical importance of proactive patch management to mitigate potential risks effectively.

    Beyond security updates, Microsoft’s July 2024 Patch Tuesday includes several enhancements and new features for Windows 11. Notably, the update introduces a controversial Game Pass advertisement within the Settings app, visible to users engaged in gaming activities. This addition aims to promote Microsoft’s gaming subscription service directly within the operating system environment.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleNokia Faces Data Breach Allegations: 7,622 Employee Records Reportedly Compromised
    Next Article City of Philadelphia Data Breach: 35,881 Affected, Including Maine Residents

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4610 – WordPress WP-Members Membership Plugin Stored Cross-Site Scripting Vulnerability

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4824 – TOTOLINK A702R, A3002R, A3002RU HTTP POST Request Handler Buffer Overflow Vulnerability

    May 17, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Exploring the Influence of AI-Based Recommenders on Human Behavior: Methodologies, Outcomes, and Future Research Directions

    Development

    Develop a Shareable URL JavaScript Dropdown Filter

    Development

    MoMA: An Open-Vocabulary and Training Free Personalized Image Model that Boasts Flexible Zero-Shot Capabilities

    Development
    PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware

    PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware

    Development

    Highlights

    fex – command-line file explorer prioritizing quick navigation

    December 29, 2024

    fex is a command-line file explorer inspired by Vim, exa and fzf, built with quick…

    Exploring the Sparse Frontier: How Researchers from Edinburgh, Cohere, and Meta Are Rethinking Attention Mechanisms for Long-Context LLMs

    April 30, 2025

    ScrapeGraphAI: A Web Scraping Python Library that Uses LLMs to Create Scraping Pipelines for Websites, Documents, and XML Files

    April 30, 2024

    Unlock Automation Success: Power Automate Workshops at TechCon365 PWRCON

    May 14, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.