JPCERT-AT-2024-0014
JPCERT/CC
2024-07-10
Microsoft Corporation
July 2024 Security Updates
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2024-Jul
Microsoft Corporation
Microsoft Security Updates for July 2024 (Monthly) (Japanese)
https://msrc.microsoft.com/blog/2024/07/202407-security-update/
According to Microsoft, among the vulnerabilities, the following vulnerabilities have been confirmed to be exploited in the wild. Please consider applying the security update programs by referring to the information provided by Microsoft.
CVE-2024-38080
Windows Hyper-V Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080
CVE-2024-38112
Windows MSHTML Platform Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112
Regarding the Windows MSHTML platform spoofing vulnerability(CVE-2024-38112), Check Point Software Technologies has published a blog about attacks that exploit the vulnerability.
Check Point Software Technologies
Resurrecting Internet Explorer: Threat Actors Using Zero-day Tricks in Internet Shortcut File to Lure Victims (CVE-2024-38112)
https://research.checkpoint.com/2024/resurrecting-internet-explorer-threat-actors-using-zero-day-tricks-in-internet-shortcut-file-to-lure-victims-cve-2024-38112/
Microsoft Update Catalog
https://www.catalog.update.microsoft.com/
Windows Update: FAQ
https://support.microsoft.com/en-us/help/12373/windows-update-faq
Microsoft Corporation
Release Notes
https://msrc.microsoft.com/update-guide/
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/
JPCERT/CC
2024-07-10
I. Overview
Microsoft has released July 2024 Security Updates to address the vulnerabilities in their products. Remote attackers leveraging these vulnerabilities may be able to execute arbitrary code. It is recommended to check the information provided by Microsoft and apply the updates.Microsoft Corporation
July 2024 Security Updates
https://msrc.microsoft.com/update-guide/en-us/releaseNote/2024-Jul
Microsoft Corporation
Microsoft Security Updates for July 2024 (Monthly) (Japanese)
https://msrc.microsoft.com/blog/2024/07/202407-security-update/
According to Microsoft, among the vulnerabilities, the following vulnerabilities have been confirmed to be exploited in the wild. Please consider applying the security update programs by referring to the information provided by Microsoft.
CVE-2024-38080
Windows Hyper-V Elevation of Privilege Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080
CVE-2024-38112
Windows MSHTML Platform Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112
Regarding the Windows MSHTML platform spoofing vulnerability(CVE-2024-38112), Check Point Software Technologies has published a blog about attacks that exploit the vulnerability.
Check Point Software Technologies
Resurrecting Internet Explorer: Threat Actors Using Zero-day Tricks in Internet Shortcut File to Lure Victims (CVE-2024-38112)
https://research.checkpoint.com/2024/resurrecting-internet-explorer-threat-actors-using-zero-day-tricks-in-internet-shortcut-file-to-lure-victims-cve-2024-38112/
II. Solution
Please apply the security update programs through Microsoft Update,Windows Update, etc. as soon as possible.Microsoft Update Catalog
https://www.catalog.update.microsoft.com/
Windows Update: FAQ
https://support.microsoft.com/en-us/help/12373/windows-update-faq
III. References
Microsoft Corporation
Release Notes
https://msrc.microsoft.com/update-guide/
If you have any information regarding this alert, please contact JPCERT/CC.
JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/