Connect with us

Hi, what are you looking for?


Malware & Threats

Patch Tuesday: Remote Code Execution Flaw in Microsoft Message Queuing

The Windows vulnerability carries a CVSS severity score of 9.8/10 and can be exploited by via specially crafted malicious MSMQ packets.

Microsoft Zero-Days

Software giant Microsoft on Tuesday called on Windows administrators to pay urgent attention to patches for a critical remote code execution vulnerability in the Microsoft Message Queuing (MSMQ) component.

The vulnerability, tagged as CVE-2024-30080, carries a CVSS severity score of 9.8/10 and can be exploited by an attacker sending specially crafted malicious MSMQ packets to a MSMQ server.

“This could result in remote code execution on the server side,” Redmond’s security response team warned in an advisory.

Microsoft said the Windows message queuing service needs to be enabled for a system to be exploitable by this vulnerability and urged customers to check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine.

The MSMQ flaw headlines another hefty Patch Tuesday that covers at least 51 security defects across a range of Windows OS, components and services.

The company documented multiple code execution issues in the Microsoft Office productivity suite, remotely exploitable bugs in the Windows Link Layer Topology Discovery Protocol and Windows Event Trace Log File Parsing,  

Security experts are also calling attention to CVE-2024-30078, a Windows WiFi driver remote code execution vulnerability with a CVSS severity score of 8.8/10.

“Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions. An unauthenticated attacker could send a malicious networking packet to an adjacent system that is employing a Wi-Fi networking adapter, which could enable remote code execution,” Microsoft warned.

Advertisement. Scroll to continue reading.

Separately, software maker Adobe warned of the risk of code execution attacks on Windows and macOS platforms via security flaws in the Adobe Photoshop, Adobe After Effects and Adobe Illustrator products.

Adobe said it was not aware of any exploits in the wild for any of the issues addressed this month.

Related: Adobe Plugs Code Execution Holes in After Effects, Illustrator

Related: Microsoft Bows to Public Pressure, Disables Windows Recall by Default

Related: SolarWinds Patches High-Severity Vulnerability Found by NATO Pentester

Related: Apple Patches Vision Pro Vulnerability Used in ‘Spatial Computing Hack’

Related: Multiple Flaws Plague Discontinued Netgear WNR614 Routers

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders.


People on the Move

Gabriel Agboruche has been named Executive Director of OT and Cybersecurity at Jacobs.

Data security startup Reco adds Merritt Baer as CISO

Chris Pashley has been named CISO at Advanced Research Projects Agency for Health (ARPA-H).

More People On The Move

Expert Insights