Adobe released six security updates for February, addressing vulnerabilities in products like Acrobat, Commerce, and Substance 3D. The most critical update is for Acrobat and Reader, as it fixes several critical code execution bugs often exploited in phishing attacks. Meanwhile, Microsoft released 72 patches for vulnerabilities in Windows, Office, Azure, and other products. Two of the Microsoft vulnerabilities were actively exploited but not publicly known at the time of release. One notable vulnerability (CVE-2024-21412) involves Internet Shortcut Files and was discovered by the ZDI Threat Hunting team, actively exploited against forex traders. Another actively exploited vulnerability (CVE-2024-21351) involves a Windows SmartScreen bypass, allowing attackers to run code without detection. Microsoft Exchange Server users should prioritize patching CVE-2024-21410, a critical elevation of privilege vulnerability that allows attackers to impersonate users. Similarly, CVE-2024-21413 in Microsoft Outlook enables attackers to bypass security features and potentially execute code, requiring immediate attention. Overall, both Adobe and Microsoft's February patches address a significant number of vulnerabilities, some under active attack, emphasizing the importance of prompt patching. The number of patches remains lower than the same period last year, but it remains to be seen if this trend will continue. Users should prioritize patching based on the severity and active exploitation status of the vulnerabilities. Always ensure all systems are updated with the latest security patches to mitigate potential threats.
thezdi.com
thezdi.com
Create attached notes ...
