Microsoft Patches Critical Windows Zero-Day Exploited in QakBot Attacks (CVE-2024-30051)
Share
In a recent security update, Microsoft addressed a critical zero-day vulnerability (CVE-2024-30051) actively exploited by attackers to deliver the QakBot malware and potentially other malicious payloads on vulnerable WIndows System. This privilege escalation vulnerability resided within the Desktop Window Manager (DWM) core library, a critical Windows service. This service was introduced in Windows Vista that permits the operating system to allocate hardware acceleration when GUI elements such as 3D transition animations and glass window frames are used.
Kaspersky Detects New Zero-Day Threat
The vulnerability was discovered by researchers at Kaspersky during an investigation into a separate Windows DWM vulnerability (CVE-2023-36033). Their investigation led them to a suspicious file uploaded to VirusTotal in April 2024, hinting at a new Windows vulnerability.
This file, though poorly written in broken English, contained details about a new zero-day vulnerability in the DWM that could be exploited to gain the highest level of system access (SYSTEM privileges). Kaspersky researchers were able to confirm the vulnerability’s existence and promptly reported it to Microsoft.
Patch Available on Patch Tuesday
Microsoft assigned the vulnerability CVE-2024-30051 and issued a patch during their May 2024 Patch Tuesday update. Security experts strongly recommend immediate installation of this update to mitigate the risk of potential exploitation.
We are going to publish technical details about CVE-2024-30051. But before that, we have seen that this vulnerability is actively used by threat actors. It is important to patch as soon as possible. https://t.co/cJ9uVaSn2L
— Mert Değirmenci (@r00tten) May 14, 2024
The CVE-2024-30051 exploit serves as a stark reminder of the ever-present vulnerability threat. While patching is vital, a layered security approach that combines proactive measures with timely updates offers a more robust defense against evolving cyber threats.
The swift exploitation of CVE-2024-30051 highlights the limitations of a reactive patching strategy. While patching remains a crucial defense against zero-day exploits, attackers are constantly evolving their tactics.