JPCERT-AT-2024-0011
JPCERT/CC
2024-05-15
Microsoft Corporation
May 2024 Security Updates
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2024-May
Microsoft Corporation
Microsoft Security Updates for May 2024 (Monthly) (Japanese)
https://msrc.microsoft.com/blog/2024/05/202405-security-update/
According to Microsoft, among the vulnerabilities, the following vulnerabilities have been confirmed to be exploited in the wild. Please consider applying the security update programs by referring to the information provided by Microsoft.
CVE-2024-30040
Windows MSHTML Platform Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040
CVE-2024-30051
Windows DWM Core Library Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051
Also, regarding the Windows MSHTML Platform Security Feature Bypass vulnerability CVE-2024-30040, Kaspersky published a blog detailing how they had reported the issue to Microsoft.
Kaspersky
QakBot attacks with Windows zero-day (CVE-2024-30051)
https://securelist.com/cve-2024-30051/112618/
Microsoft Update Catalog
https://www.catalog.update.microsoft.com/
Windows Update: FAQ
https://support.microsoft.com/en-us/help/12373/windows-update-faq
Microsoft Corporation
Release Notes
https://msrc.microsoft.com/update-guide/
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/
JPCERT/CC
2024-05-15
I. Overview
Microsoft has released May 2024 Security Updates to address the vulnerabilities in their products. Remote attackers leveraging these vulnerabilities may be able to execute arbitrary code. It is recommended to check the information provided by Microsoft and apply the updates.Microsoft Corporation
May 2024 Security Updates
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2024-May
Microsoft Corporation
Microsoft Security Updates for May 2024 (Monthly) (Japanese)
https://msrc.microsoft.com/blog/2024/05/202405-security-update/
According to Microsoft, among the vulnerabilities, the following vulnerabilities have been confirmed to be exploited in the wild. Please consider applying the security update programs by referring to the information provided by Microsoft.
CVE-2024-30040
Windows MSHTML Platform Security Feature Bypass Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30040
CVE-2024-30051
Windows DWM Core Library Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051
Also, regarding the Windows MSHTML Platform Security Feature Bypass vulnerability CVE-2024-30040, Kaspersky published a blog detailing how they had reported the issue to Microsoft.
Kaspersky
QakBot attacks with Windows zero-day (CVE-2024-30051)
https://securelist.com/cve-2024-30051/112618/
II. Solution
Please apply the security update programs through Microsoft Update,Windows Update, etc. as soon as possible.Microsoft Update Catalog
https://www.catalog.update.microsoft.com/
Windows Update: FAQ
https://support.microsoft.com/en-us/help/12373/windows-update-faq
III. References
Microsoft Corporation
Release Notes
https://msrc.microsoft.com/update-guide/
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/