LOADING

Type to search

Microsoft Patches Critical Windows Zero-Day Exploited in QakBot Attacks (CVE-2024-30051)

Cybersecurity News

Microsoft Patches Critical Windows Zero-Day Exploited in QakBot Attacks (CVE-2024-30051)

Share
Microsoft Patches Critical Windows Zero-Day Exploited in QakBot Attacks (CVE-2024-30051)

In a recent security update, Microsoft addressed a critical zero-day vulnerability (CVE-2024-30051) actively exploited by attackers to deliver the QakBot malware and potentially other malicious payloads on vulnerable WIndows System. This privilege escalation vulnerability resided within the Desktop Window Manager (DWM) core library, a critical Windows service. This service was introduced in Windows Vista that permits the operating system to allocate hardware acceleration when GUI elements such as 3D transition animations and glass window frames are used.

Kaspersky Detects New Zero-Day Threat

The vulnerability was discovered by researchers at Kaspersky during an investigation into a separate Windows DWM vulnerability (CVE-2023-36033). Their investigation led them to a suspicious file uploaded to VirusTotal in April 2024, hinting at a new Windows vulnerability.

This file, though poorly written in broken English, contained details about a new zero-day vulnerability in the DWM that could be exploited to gain the highest level of system access (SYSTEM privileges). Kaspersky researchers were able to confirm the vulnerability’s existence and promptly reported it to Microsoft.

Patch Available on Patch Tuesday

Microsoft assigned the vulnerability CVE-2024-30051 and issued a patch during their May 2024 Patch Tuesday update. Security experts strongly recommend immediate installation of this update to mitigate the risk of potential exploitation.

The CVE-2024-30051 exploit serves as a stark reminder of the ever-present vulnerability threat. While patching is vital, a layered security approach that combines proactive measures with timely updates offers a more robust defense against evolving cyber threats.

The swift exploitation of CVE-2024-30051 highlights the limitations of a reactive patching strategy. While patching remains a crucial defense against zero-day exploits, attackers are constantly evolving their tactics. 

Author

  • Maya Pillai is a tech writer with 20+ years of experience curating engaging content. She can translate complex ideas into clear, concise information for all audiences.

    View all posts
Tags:
Maya Pillai

Maya Pillai is a tech writer with 20+ years of experience curating engaging content. She can translate complex ideas into clear, concise information for all audiences.

  • 1

Leave a Comment

Your email address will not be published. Required fields are marked *