Microsoft on Tuesday released 71 patches touching 10 product families. Seventeen of the addressed issues, all affecting Windows, are considered by Microsoft to be of Critical severity and all have a CVSS base score of 8.1 or higher. Ten of these involve Remote Desktop Services. At patch time, one of the issues addressed (CVE-2024-49138, an Important-severity Windows Common Log File system driver issue) is known to be under exploit in the wild, with 6 additional CVEs more likely to be exploited in the next 30 days by the company's estimation. Five of this month's issues are amenable to detection by Sophos protections, and we include information on those in a table below.
In addition to these patches, the release includes advisory information on two Edge CVEs (patched last week), a Defense-in-Depth update for a specific version of Microsoft Project, and information on six bulletins released by Adobe this week. We are as always including at the end of this post additional appendices listing all Microsoft's patches, sorted by severity, by predicted exploitability, and by product family.
Finally, this month we are adding a new appendix that breaks out each month's Windows Server patches by affected version. Administrators are encouraged to use this appendix as a starting point to ascertain their specific exposure, as each reader's situation -- especially as it concerns products out of mainstream support -- will vary.
Figure 1: December's CVEs include no spoofing, denial of service, or security feature bypass issues, but there are plenty of Critical-severity RCEs to keep system administrators busy
Products
As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect.
Figure 2: Six of the ten product families covered in this month's updates have just one patch apiece. Muzic is a music-generation project on Github (https://github.com/microsoft/muzic) originally developed by a team from Microsoft Research Asia
Notable December updates
In addition to the issues discussed above, a number of specific items merit attention.
CVE-2024-49112 -- Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
The only CVE this month with a CVSS base score over 9.0, this Critical-severity RCE weighs in at 9.8/10 and affects not only all supported versions of Windows 10 and 11, but all versions of Server stretching back to 2008. Complexity is low (it requires a maliciously crafted set of LDAP calls), it requires neither privileges nor user interaction, and the attacker able to successfully exploit the bug gains the ability to execute arbitrary code within the context of the LDAP service. For administrators unable to prioritize this patch for whatever reason, Microsoft advises them to ensure that domain controllers are not configured to access the internet, and that inbound RPC from untrusted networks is disallowed.
CVE-2024-49138 -- Windows Common Log File System Driver Elevation of Privilege Vulnerability
The only December CVE that's known to be under active exploit in the wild, this Important-severity elevation of privilege issue likewise affects all supported client and server versions of Windows. A successful attacker would gain system privileges.
CVE-2024-49117 - Windows Hyper-V Remote Code Execution Vulnerability
An attacker successfully utilizing this Critical-severity RCE could potentially execute a cross-VM attack, leaping out of the originally compromised machine to compromise others.
CVE-2024-49114 -- Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
This Important-severity issue is a fascinating example of what just might be a new category of vulnerability: False File Immutability, in which certain assumptions built into certain Windows componentry could lead to untrustworthy files, bad system behaviors, or other vulnerabilities. Nevertheless, Microsoft categorizes this CVE as an Elevation of Privilege issue, one more likely to be exploited within the next 30 days.
12 CVEs - RDP issues
As covered in our Active Adversary technical reports, RDP continues to be the Microsoft component most often abused by attackers. Both client-side and server-side installations are in for it this month, with 10 of these CVEs classed as Critical-severity by Microsoft.
Figure 3: And as 2024 concludes, Remote Code Execution vulnerabilities retain their standing as the most common bug species to be squashed, retaining the title seized from Elevation of Privilege at the end of 2023
Though it started off with three relatively light months, 2024 ends with 1015 CVEs addressed through the Patch Tuesday process - the highest annual count since 2020's total of 1245 patches. 2024 also included the two single highest one-month patch counts, in April (147) and July (138). For those curious, December 2023 had the lowest count of the past five years, with 33 patches.
Figure 4: If it felt like 2020 was a crazy year for Microsoft patches, you're not wrong. Though 2024 had several banner months, 2020 was overall the heaviest patch load in four years for most administrators
As you can every month, if you don't want to wait for your system to pull down Microsoft's updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows 10 or 11 you're running, then download the Cumulative Update package for your specific system's architecture and build number.
Appendix A: Vulnerability Impact and Severity
This is a list of December patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.
This is a list of the December CVEs judged by Microsoft to be either under exploitation in the wild or more likely to be exploited in the wild within the first 30 days post-release. The list is arranged by CVE.
This is a list of December's patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family. Issues affecting Windows Server are further sorted in Appendix E.
This is a list of advisories and information on other relevant CVEs in the December release.
This is a table of CVEs in the December release affecting nine Windows Server versions -- 2008 through 2025. The table differentiates among major versions of the platform but doesn't go into deeper detail (eg., Server Core). Critical-severity issues are marked in red; an "x" indicates that the CVE does not apply to that version. Administrators are encouraged to use this appendix as a starting point to ascertain their specific exposure as each reader's situation, especially as it concerns products out of mainstream support, will vary.