Blog Post

Ritelink Blog > News > TECHNOLOGY > Microsoft Releases December 2024 Patch Tuesday Updates

Microsoft Releases December 2024 Patch Tuesday Updates

Microsoft’s December 2024 Patch Tuesday updates addressed 72 vulnerabilities.

72 vulnerabilities fixed in the December 2024 Patch Tuesday updates

In December, Microsoft fixed a total of 72 vulnerabilities, 16 of which were deemed “Critical.” Additionally, there are 54 security flaws rated as “Important” and one is rated “Moderate” in terms of severity. Here’s a list of the most notable vulnerabilities Microsoft addressed in December:

  • CVE-2024-49138: This is a moderate-level security flaw in the Windows Common Log File System Driver that could enable hackers to launch privilege escalation attacks. This technique can be used to gain system-level privileges on Windows Server machines.
  • CVE-2024-49112: This is a critical security vulnerability with a CVSS score of 9.8. It’s an unauthenticated RCE issue in the Windows Lightweight Directory Access Protocol (LDAP). Cybercriminals could exploit this flaw to compromise Windows 10 systems and Domain Controllers by sending custom LDAP calls.
  • CVE-2024-49117: This critical RCE vulnerability in Windows Hyper-V allows threat actors on a guest virtual machine (VM) to execute code on the underlying host OS and perform a cross-VM attack.
  • CVE-2024-49093: This is an EoP vulnerability in the Windows Resilient File System (ReFS). It’s a file system designed to offer enhanced scalability and fault tolerance for virtualization environments, databases, and backups.
  • CVE-2024-49070: This vulnerability could enable an attacker to execute arbitrary code on the SharePoint server. However, it requires the hacker to have local access to the system.

You can find the full list of CVEs addressed in the December 2024 Patch Tuesday Updates below:

ProductPlatformMax SeverityArticleDetails
Windows App Client for Windows DesktopCriticalRelease NotesCVE-2024-49105
Windows Server 2012 R2 (Server Core installation)Critical5048735CVE-2024-49105
Windows Server 2012 R2Critical5048735CVE-2024-49105
Windows Server 2012 (Server Core installation)Critical5048699CVE-2024-49105
Windows Server 2012Critical5048699CVE-2024-49105
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Critical5048695CVE-2024-49105
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Critical5048676CVE-2024-49105
Windows Server 2008 R2 for x64-based Systems Service Pack 1Critical5048695CVE-2024-49105
Windows Server 2008 R2 for x64-based Systems Service Pack 1Critical5048676CVE-2024-49105
Windows Server 2016 (Server Core installation)Critical5048671CVE-2024-49105
Windows Server 2016Critical5048671CVE-2024-49105
Windows 10 Version 1607 for x64-based SystemsCritical5048671CVE-2024-49105
Windows 10 Version 1607 for 32-bit SystemsCritical5048671CVE-2024-49105
Windows 10 for x64-based SystemsCritical5048703CVE-2024-49105
Windows 10 for 32-bit SystemsCritical5048703CVE-2024-49105
Windows Server 2025Critical5048667CVE-2024-49105
Windows Server 2025Critical5048794CVE-2024-49105
Windows 11 Version 24H2 for x64-based SystemsCritical5048667CVE-2024-49105
Windows 11 Version 24H2 for x64-based SystemsCritical5048794CVE-2024-49105
Windows 11 Version 24H2 for ARM64-based SystemsCritical5048667CVE-2024-49105
Windows 11 Version 24H2 for ARM64-based SystemsCritical5048794CVE-2024-49105
Windows Server 2022, 23H2 Edition (Server Core installation)Critical5048653CVE-2024-49105
Windows 11 Version 23H2 for x64-based SystemsCritical5048685CVE-2024-49105
Windows 11 Version 23H2 for ARM64-based SystemsCritical5048685CVE-2024-49105
Windows Server 2025 (Server Core installation)Critical5048667CVE-2024-49105
Windows Server 2025 (Server Core installation)Critical5048794CVE-2024-49105
Windows 10 Version 22H2 for 32-bit SystemsCritical5048652CVE-2024-49105
Windows 10 Version 22H2 for ARM64-based SystemsCritical5048652CVE-2024-49105
Windows 10 Version 22H2 for x64-based SystemsCritical5048652CVE-2024-49105
Windows 11 Version 22H2 for x64-based SystemsCritical5048685CVE-2024-49105
Windows 11 Version 22H2 for ARM64-based SystemsCritical5048685CVE-2024-49105
Windows 10 Version 21H2 for x64-based SystemsCritical5048652CVE-2024-49105
Windows 10 Version 21H2 for ARM64-based SystemsCritical5048652CVE-2024-49105
Windows 10 Version 21H2 for 32-bit SystemsCritical5048652CVE-2024-49105
Windows Server 2022 (Server Core installation)Critical5048654CVE-2024-49105
Windows Server 2022 (Server Core installation)Critical5048800CVE-2024-49105
Windows Server 2022Critical5048654CVE-2024-49105
Windows Server 2022Critical5048800CVE-2024-49105
Remote Desktop client for Windows DesktopCriticalRelease NotesCVE-2024-49105
Windows Server 2019 (Server Core installation)Critical5048661CVE-2024-49105
Windows Server 2019Critical5048661CVE-2024-49105
Windows 10 Version 1809 for x64-based SystemsCritical5048661CVE-2024-49105
Windows 10 Version 1809 for 32-bit SystemsCritical5048661CVE-2024-49105
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Important5048710CVE-2024-49088
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Important5048744CVE-2024-49088
Microsoft Office 2016 (32-bit edition)Important5002661CVE-2024-43600
Microsoft Office 2016 (32-bit edition)Important2920716CVE-2024-43600
Microsoft Office 2016 (32-bit edition)Important4475587CVE-2024-43600
Microsoft Project 2016 (64-bit edition)Moderate5002652ADV240002
Microsoft Project 2016 (32-bit edition)Moderate5002652ADV240002
Microsoft Access 2016 (64-bit edition)Important5002641CVE-2024-49142
Microsoft Access 2016 (32-bit edition)Important5002641CVE-2024-49142
Microsoft Office LTSC 2024 for 64-bit editionsImportantClick to RunCVE-2024-49142
Microsoft Office LTSC 2024 for 32-bit editionsImportantClick to RunCVE-2024-49142
Windows Server 2008 for x64-based Systems Service Pack 2Important5048710CVE-2024-49121
Windows Server 2008 for x64-based Systems Service Pack 2Important5048744CVE-2024-49121
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Important5048710CVE-2024-49138
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Important5048744CVE-2024-49138
Windows Server 2008 for 32-bit Systems Service Pack 2Important5048710CVE-2024-49138
Windows Server 2008 for 32-bit Systems Service Pack 2Important5048744CVE-2024-49138
Microsoft Word 2016 (64-bit edition)Important5002661CVE-2024-49065
Microsoft Word 2016 (32-bit edition)Important5002661CVE-2024-49065
Microsoft Office LTSC for Mac 2024ImportantRelease NotesCVE-2024-49065
Microsoft Office LTSC 2021 for 32-bit editionsImportantClick to RunCVE-2024-49065
Microsoft Office LTSC 2021 for 64-bit editionsImportantClick to RunCVE-2024-49065
Microsoft Office LTSC for Mac 2021ImportantRelease NotesCVE-2024-49065
Microsoft 365 Apps for Enterprise for 64-bit SystemsImportantClick to RunCVE-2024-49065
Microsoft 365 Apps for Enterprise for 32-bit SystemsImportantClick to RunCVE-2024-49065
Microsoft Office 2019 for 64-bit editionsImportantClick to RunCVE-2024-49065
Microsoft Office 2019 for 32-bit editionsImportantClick to RunCVE-2024-49065
Microsoft SharePoint Server 2019Important5002657CVE-2024-49065
Microsoft SharePoint Enterprise Server 2016Important5002659CVE-2024-49065
Microsoft/MuzicImportantRelease NotesCVE-2024-49063
Microsoft SharePoint Server Subscription EditionImportant5002658CVE-2024-49062
Microsoft SharePoint Server 2019Important5002664CVE-2024-49062
Microsoft SharePoint Enterprise Server 2016Important5002544CVE-2024-49062
Microsoft Office 2016 (64-bit edition)Important5002661CVE-2024-43600
Microsoft Office 2016 (64-bit edition)Important2920716CVE-2024-43600
Microsoft Office 2016 (64-bit edition)Important4475587CVE-2024-43600
Microsoft Excel 2016 (64-bit edition)Important5002660CVE-2024-49069
Microsoft Excel 2016 (32-bit edition)Important5002660CVE-2024-49069
Microsoft Defender for Endpoint for AndroidImportantRelease NotesCVE-2024-49057
System Center Operations Manager (SCOM) 2025ImportantRelease NotesCVE-2024-43594
System Center Operations Manager (SCOM) 2022ImportantRelease NotesCVE-2024-43594
System Center Operations Manager (SCOM) 2019ImportantRelease NotesCVE-2024-43594

Quality and experience updates

Microsoft released the KB5048667 and KB5048685 updates for PCs running Windows 11 versions 24H2 and 23H2. This release allows users to share content to an Android device from the context menu in File Explorer and on the desktop. However, this feature requires users to install and configure the Phone Link app.

Additionally, Microsoft has added new options to enhance user control over mouse settings. Users can now turn off enhanced mouse pointer precision and change the direction in which the mouse scrolls. This capability is only available in Windows 11 version 23H2/22H2.

The KB5048652 update brings a couple of bug fixes for Windows 10 PCs. Specifically, Microsoft has addressed a bug that affected how files were handled when dragged and dropped from a cloud files provider folder. Previously, when users dragged and dropped files from these cloud folders, the files were moved to the new location instead of being copied. With the update, the default action now ensures that files are copied rather than moved, preserving the original files in the cloud folder.

Windows Update testing and best practices

Microsoft advises organizations to perform thorough testing to confirm that updates do not compromise the stability of their production systems. However, it is crucial to deploy Patch Tuesday updates to proactively address potential threats.

Additionally, IT administrators must prioritize backing up their systems before applying updates, utilizing the built-in backup features of Windows and Windows Server. These features allow for the restoration of specific files and folders or entire systems as required.

Last but not least, organizations should consistently monitor their systems for anomalies or unexpected behaviors. Regular monitoring is essential for staying vigilant against emerging risks and adopting appropriate security measures.

Leave a comment

Your email address will not be published. Required fields are marked *