LOADING

Type to search

Microsoft Patches Critical Windows Zero-Day Exploited in QakBot Attacks (CVE-2024-30051)

Cybersecurity News

Microsoft Patches Critical Windows Zero-Day Exploited in QakBot Attacks (CVE-2024-30051)

Share
Microsoft Patches Critical Windows Zero-Day Exploited in QakBot Attacks (CVE-2024-30051)

In a recent security update, Microsoft addressed a critical zero-day vulnerability (CVE-2024-30051) actively exploited by attackers to deliver the QakBot malware and potentially other malicious payloads on vulnerable WIndows System. This privilege escalation vulnerability resided within the Desktop Window Manager (DWM) core library, a critical Windows service. This service was introduced in Windows Vista that permits the operating system to allocate hardware acceleration when GUI elements such as 3D transition animations and glass window frames are used.

Kaspersky Detects New Zero-Day Threat

The vulnerability was discovered by researchers at Kaspersky during an investigation into a separate Windows DWM vulnerability (CVE-2023-36033). Their investigation led them to a suspicious file uploaded to VirusTotal in April 2024, hinting at a new Windows vulnerability.

This file, though poorly written in broken English, contained details about a new zero-day vulnerability in the DWM that could be exploited to gain the highest level of system access (SYSTEM privileges). Kaspersky researchers were able to confirm the vulnerability’s existence and promptly reported it to Microsoft.

Patch Available on Patch Tuesday

Microsoft assigned the vulnerability CVE-2024-30051 and issued a patch during their May 2024 Patch Tuesday update. Security experts strongly recommend immediate installation of this update to mitigate the risk of potential exploitation.

The CVE-2024-30051 exploit serves as a stark reminder of the ever-present vulnerability threat. While patching is vital, a layered security approach that combines proactive measures with timely updates offers a more robust defense against evolving cyber threats.

The swift exploitation of CVE-2024-30051 highlights the limitations of a reactive patching strategy. While patching remains a crucial defense against zero-day exploits, attackers are constantly evolving their tactics. 

Author

  • Maya Pillai holds a degree in Computer Applications and has been writing on technology for over two decades. For the past two years, she has focused exclusively on cybersecurity, helping readers navigate everything from ransomware threats to endpoint protection. Through her blog The Review Hive, Maya distils complex cyber topics into clear, practical insights tailored for individuals and small businesses alike. Maya mentors aspiring writers on her second platform, mayapillaiwrites.com, blending technical expertise with storytelling finesse.

    View all posts
Tags:
Maya Pillai

Maya Pillai holds a degree in Computer Applications and has been writing on technology for over two decades. For the past two years, she has focused exclusively on cybersecurity, helping readers navigate everything from ransomware threats to endpoint protection. Through her blog The Review Hive, Maya distils complex cyber topics into clear, practical insights tailored for individuals and small businesses alike. Maya mentors aspiring writers on her second platform, mayapillaiwrites.com, blending technical expertise with storytelling finesse.

  • 1

Leave a Comment

Your email address will not be published. Required fields are marked *