In the latest November Patch Tuesday from Microsoft, a total of 91 vulnerabilities were addressed, including four zero-day vulnerabilities, two of which were actively being exploited in attacks. The update fixed four critical issues, two of which allowed remote code execution and two that allowed privilege escalation.
The categories of vulnerabilities addressed in November include 26 elevation of privilege vulnerabilities, 2 security feature bypass vulnerabilities, 52 remote code execution vulnerabilities, 1 information disclosure vulnerability, 4 denial of service vulnerabilities, and 3 spoofing vulnerabilities.
Notably, two vulnerabilities in the Edge browser that were previously patched on November 7 were not included in this latest update.
For more information on the latest updates, users can refer to the specific pages for Windows 11 KB5046617 and KB5046633, as well as the update for Windows 10 KB5046613.
Of the four zero-day vulnerabilities addressed in the November Patch Tuesday, two were actively being used by attackers while the other two had been publicly disclosed. Zero-day vulnerabilities are categorized as known issues that are actively being exploited before an official fix is available.
The actively exploited vulnerabilities include CVE-2024-43451, which allows a remote attacker to obtain NTLMv2 Hash with minimal interaction from a malicious file, and CVE-2024-49039, which enables privilege elevation in the Windows Task Scheduler.