Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Patch Tuesday: Remote Code Execution Flaw in Microsoft Message Queuing

The Windows vulnerability carries a CVSS severity score of 9.8/10 and can be exploited by via specially crafted malicious MSMQ packets.

Microsoft vulnerability

Software giant Microsoft on Tuesday called on Windows administrators to pay urgent attention to patches for a critical remote code execution vulnerability in the Microsoft Message Queuing (MSMQ) component.

The vulnerability, tagged as CVE-2024-30080, carries a CVSS severity score of 9.8/10 and can be exploited by an attacker sending specially crafted malicious MSMQ packets to a MSMQ server.

“This could result in remote code execution on the server side,” Redmond’s security response team warned in an advisory.

Microsoft said the Windows message queuing service needs to be enabled for a system to be exploitable by this vulnerability and urged customers to check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine.

The MSMQ flaw headlines another hefty Patch Tuesday that covers at least 51 security defects across a range of Windows OS, components and services.

The company documented multiple code execution issues in the Microsoft Office productivity suite, remotely exploitable bugs in the Windows Link Layer Topology Discovery Protocol and Windows Event Trace Log File Parsing,  

Advertisement. Scroll to continue reading.

Security experts are also calling attention to CVE-2024-30078, a Windows WiFi driver remote code execution vulnerability with a CVSS severity score of 8.8/10.

“Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions. An unauthenticated attacker could send a malicious networking packet to an adjacent system that is employing a Wi-Fi networking adapter, which could enable remote code execution,” Microsoft warned.

Separately, software maker Adobe warned of the risk of code execution attacks on Windows and macOS platforms via security flaws in the Adobe Photoshop, Adobe After Effects and Adobe Illustrator products.

Adobe said it was not aware of any exploits in the wild for any of the issues addressed this month.

Related: Adobe Plugs Code Execution Holes in After Effects, Illustrator

Related: Microsoft Bows to Public Pressure, Disables Windows Recall by Default

Related: SolarWinds Patches High-Severity Vulnerability Found by NATO Pentester

Related: Apple Patches Vision Pro Vulnerability Used in ‘Spatial Computing Hack’

Related: Multiple Flaws Plague Discontinued Netgear WNR614 Routers

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Chris Sistrunk has been promoted to Practice Leader for Mandiant's OT Security Consulting.

Nudge Security has appointed Patrick Dillon as its Chief Revenue Officer.

AutoNation has appointed Brian Fricke as Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.