Partnership will provide SAP customers with comprehensive exposure management capabilities and in-depth visibility of attack surfaces.
Related Posts
Windows 10 PLUGScheduler Vulnerability Allows Privilege Escalation
Windows 10 PLUGScheduler Vulnerability Allows Privilege Escalation
A critical vulnerability in the Windows 10 operating system, tracked as CVE-2024-26238, could allow attackers to gain elevated privileges on affected systems. The flaw resides in the PLUGScheduler component of Windows 10 versions 21H2 and 22H2.
PLUGScheduler is a scheduled task that is part of the Reusable UX Integration Manager (RUXIM), a component used by Windows Update. The task runs with SYSTEM privileges and is located in the MicrosoftWindowsWindowsUpdateRUXIM directory.
According to a security advisory published by Synacktiv, the PLUGScheduler.exe binary performs file operations such as deletion and renaming with SYSTEM privileges in a directory where standard users have partial control.
Attackers can exploit this flaw to achieve arbitrary file write access with SYSTEM privileges.
Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers
The vulnerability was reported to Microsoft on January 22, 2024, and was confirmed by the Microsoft Security Response Center (MSRC) on February 1, 2024.
Microsoft assigned the flaw the CVE identifier CVE-2024-26238 and released a patch in the May 2024 Patch Tuesday update, specifically in the KB5037768 cumulative update.
Synacktiv has provided a timeline of events related to the discovery and patching of the vulnerability:
2024.01.22: Advisory sent to MSRC
2024.02.01: Vulnerability confirmed by MSRC
2024.05.14: Vulnerability assigned CVE-2024-26238 and patched in KB5037768
2024.05.24: Public release of the advisory.
Microsoft has assigned the vulnerability a severity rating of “High.” Successful exploitation of this flaw could allow attackers to elevate their privileges on the affected system, potentially leading to complete system compromise.
Windows 10 users and administrators are strongly advised to apply the KB5037768 cumulative update as soon as possible to mitigate the risk posed by this vulnerability.
It is essential to keep systems up to date with the latest security patches to prevent attackers from exploiting known vulnerabilities.
This vulnerability is one of the 61 flaws fixed by Microsoft in the May 2024 Patch Tuesday update, which also addressed three zero-day vulnerabilities.
System administrators should review the patch release and prioritize deploying critical security updates to ensure the security and integrity of their Windows environments.
ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service
The post Windows 10 PLUGScheduler Vulnerability Allows Privilege Escalation appeared first on Cyber Security News.
NSA will establish an AI Security Center.
NSA will establish an AI Security Center.
The AI Security Center is designed to keep AI well-behaved, secured against attack, and a technology where the US retains its lead. Read More
The CyberWire
Mike Hamilton, former CISO from Seattle and CISO of cybersecurity firm, Critical Insight, discusses what you need to know about NIST 2.0.
Mike Hamilton, former CISO from Seattle and CISO of cybersecurity firm, Critical Insight, discusses what you need to know about NIST 2.0.
This interview from June 30th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with Mike Hamilton, former CISO from Seattle and CISO of cybersecurity firm, Critical Insight, to discuss what you need to know about NIST 2.0. Read More
The CyberWire