Critical Microsoft bug from 2024 under exploitation
Briefly

Critical Microsoft bug from 2024 under exploitation
"The US Cybersecurity and Infrastructure Security Agency added CVE-2024-43468 to its Known Exploited Vulnerabilities catalog on Thursday, setting a March 5 deadline for federal agencies to deploy the patch. The 9.8-rated SQL injection vulnerability exists in Microsoft Configuration Manager, which IT admins use to manage organizations' Windows-based servers and laptops. And it allows unauthenticated, remote attackers to execute commands on the server and/or underlying database."
"When it originally disclosed the bug in October 2024, Microsoft deemed it "exploitation less likely," and the Windows vendor's security update still lists that vulnerability as not being under attack. Since that time, however, at least two proof-of-concept exploits have been published, so you really should drop everything else and patch this bug before taking off for the long Presidents' Day weekend."
CISA added CVE-2024-43468 to its Known Exploited Vulnerabilities catalog and set a March 5 deadline for federal agencies to deploy the patch. The vulnerability is a 9.8-rated SQL injection in Microsoft Configuration Manager that enables unauthenticated remote attackers to execute commands on servers or underlying databases. A researcher at Synacktiv found and reported the bug to Microsoft. Microsoft originally characterized exploitation as less likely, but at least two proof-of-concept exploits have since been published. CISA reports unknown ransomware abuse. Immediate patching is advised for affected businesses and government agencies.
Read at Theregister
Unable to calculate read time
[
|
]