{"id":52375,"date":"2024-02-15T11:06:07","date_gmt":"2024-02-15T11:06:07","guid":{"rendered":"https:\/\/www.n-able.com\/?p=52375"},"modified":"2024-03-04T14:59:57","modified_gmt":"2024-03-04T14:59:57","slug":"patch-tuesday-february-2024","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024","title":{"rendered":"Patch Tuesday February 2024: High Impact Exchange Vulnerability Uprated on Day After Release as Exploitation Detected"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">Microsoft addressed 74 new vulnerabilities this month, two of which were marked as zero-day vulnerabilities that are relatively low impact as they provide bypasses for security flagging features in Windows. The bigger news is a third possible zero-day vulnerability that Microsoft re-categorized one day after release on February 14<\/span><span class=\"s2\"><sup>th<\/sup><\/span><span class=\"s1\">, upgrading it from Exploitation More Likely to Exploitation Detected. We\u2019ll get into the semantics of if it really qualifies as a zero-day below, but it should definitely have your attention.<\/span><\/p>\n<hr \/>\n<p><strong>Set your sights on the future of the MSP industry with the first ever <a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\">MSP Horizons Report<\/a>, jointly produced by N\u2011able and international MSP-focused research firm, Canalys\u2026<\/strong><br \/>\n<a href=\"https:\/\/www.n-able.com\/resources\/the-msp-horizons-report-2024\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\" alt=\"\" width=\"1049\" height=\"443\" class=\"alignnone size-full wp-image-52700\" srcset=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg 1049w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-300x127.jpg 300w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-1024x432.jpg 1024w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-768x324.jpg 768w, https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner-700x296.jpg 700w\" sizes=\"auto, (max-width: 1049px) 100vw, 1049px\" \/><\/a><\/p>\n<hr \/>\n<h2 class=\"p2\"><span class=\"s1\">Microsoft Vulnerabilities <\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Of the new vulnerabilities addressed this month, five are rated Critical. On the day of release there were only two vulnerabilities that were marked as Exploitation Detected, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21351\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2024-21351<\/span><\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21412\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2024-21412<\/span><\/a>. One day later, on February 14<\/span><span class=\"s2\"><sup>th<\/sup><\/span><span class=\"s1\">, Microsoft updated <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21410\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2024-21410<\/span><\/a> to indicate that it \u201cwas aware of exploitation of this vulnerability\u201d by changing it from Exploitation More Likely to Exploitation Detected. As there is no further information about when Microsoft knew it was under active exploitation this could have been just an informational change based on new information provided to Microsoft, or it may have already been known to Microsoft. Either way this makes it a little fuzzy on whether you can call this a zero-day or not. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">CVE-2024-21412, an Internet Shortcut Files Security Feature Bypass, and CVE-2024-21351, a Windows SmartScreen Security Feature Bypass, were both designated as under active exploitation on the day they were published, so giving them the label of zero-day is fairly cut and dry. While they are under active exploitation, the fact that they are only bypasses of Windows in-built security warning prompts means if you are using a modern endpoint security solution any impact should be mitigated\u2014although not eliminated. <\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">However, CVE-2024-21410 is an Exchange Server Elevation of Privilege vulnerability affecting Microsoft Exchange Server 2019 and 2016. This vulnerability is an NTLM hash disclosure that allows an attacker to capture and relay NTLM hashes against an Exchange Server to perform actions as the compromised user. Depending on the user\u2019s permissions and scope of access this could allow an attacker to pivot and further compromise an environment. There is extensive additional information and mitigation instructions available from Microsoft here:<\/span><\/p>\n<ul>\n<li class=\"p3\"><span class=\"s5\"><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-2024-h1-cumulative-update-for-exchange-server\/ba-p\/4047506\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\">2024 H1 Cumulative Update for Exchange Server<\/span><\/a><\/span><\/li>\n<li class=\"p3\"><span class=\"s5\"><a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=36036\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\">Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2<\/span><\/a><\/span><\/li>\n<li class=\"p4\"><span class=\"s5\"><a href=\"https:\/\/microsoft.github.io\/CSS-Exchange\/Security\/ExchangeExtendedProtectionManagement\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s6\">Exchange Extended Protection Management<\/span><\/a><\/span><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"s1\">If you manage Exchange Server 2019 or 2016 this should be your priority action for the week. <\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">It&#8217;s Not Only Patches<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Microsoft releases more than just patches on Patch Tuesday. Sometimes they also release advisories and updates to older advisories. This month they updated <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV990001\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">ADV990001<\/span><\/a> to include new Servicing Stack Updates now available for Windows Server 2008, Server 2008 R2, Server 2012, and Server 2012 R2 all of which are under Extended Security Updates as well as Windows 10 and Server 2016. While there\u2019s nothing newsworthy in this particular advisory it\u2019s important to remember they exist and you should ensure you review them as part of your Patch Tuesday process. <\/span><\/p>\n<h2 class=\"p5\"><span class=\"s1\">Microsoft Patch Tuesday Vulnerability Prioritization<\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">Addressing vulnerabilities effectively requires a mix of adhering to established best practices and leveraging informed judgment. While it\u2019s a natural instinct to rank vulnerabilities with critical severity ratings higher on the list of things that need to be addressed, relying on severity ratings alone can be limiting. An often-overlooked component is temporal metrics, which provide a measure of the window of vulnerability\u2014the time from initial vulnerability discovery to the availability and application of the patch. This is essential as the longer a vulnerability exists without a fix, the greater the potential for exploitation. By integrating temporal metrics into the risk evaluation process, organizations can gain a more comprehensive understanding of the threat landscape and potential attack vectors, ensuring that they don\u2019t leave themselves open to unnecessary risks.<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>Table Key:\u00a0<\/b>Severity:\u00a0C = Critical, I = Important, M = Moderate, R = Re-issue;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected,\u00a0EU = Exploitation Unlikely, N\/A = Not Available<\/span><\/p>\n<table cellspacing=\"0\" cellpadding=\"0\" class=\"t1\">\n<tbody>\n<tr>\n<td valign=\"top\" class=\"td1\">\n<p class=\"p7\" width=\"20%\"><strong><span class=\"s1\">CVE Number<\/span><\/strong><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\">\n<p class=\"p7\" width=\"60%\"><strong><span class=\"s1\">CVE Title<\/span><\/strong><\/p>\n<\/td>\n<td valign=\"top\" class=\"td3\">\n<p class=\"p7\" width=\"10%\" style=\"text-align: center;\"><strong><span class=\"s1\">Severity<\/span><\/strong><\/p>\n<\/td>\n<td valign=\"top\" class=\"td4\">\n<p class=\"p7\" width=\"10%\" style=\"text-align: center;\"><strong><span class=\"s1\">Status<\/span><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21410\" target=\"_blank\" rel=\"noopener\">CVE-2024-21410<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Microsoft Exchange Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21412\" target=\"_blank\" rel=\"noopener\">CVE-2024-21412<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Internet Shortcut Files Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43890\" target=\"_blank\" rel=\"noopener\">CVE-2021-43890<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Windows AppX Installer Spoofing Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21351\" target=\"_blank\" rel=\"noopener\">CVE-2024-21351<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Windows SmartScreen Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">M<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21380\" target=\"_blank\" rel=\"noopener\">CVE-2024-21380<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Microsoft Dynamics Business Central\/NAV Information Disclosure Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-20684\" target=\"_blank\" rel=\"noopener\">CVE-2024-20684<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Windows Hyper-V Denial of Service Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21357\" target=\"_blank\" rel=\"noopener\">CVE-2024-21357<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21379\" target=\"_blank\" rel=\"noopener\">CVE-2024-21379<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Microsoft Word Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21378\" target=\"_blank\" rel=\"noopener\">CVE-2024-21378<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Microsoft Outlook Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21371\" target=\"_blank\" rel=\"noopener\">CVE-2024-21371<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21346\" target=\"_blank\" rel=\"noopener\">CVE-2024-21346<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Win32k Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21345\" target=\"_blank\" rel=\"noopener\">CVE-2024-21345<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21338\" target=\"_blank\" rel=\"noopener\">CVE-2024-21338<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p7\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td9\">\n<p class=\"p8\"><span class=\"s7\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21413\" target=\"_blank\" rel=\"noopener\">CVE-2024-21413<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td10\">\n<p class=\"p7\"><span class=\"s1\">Microsoft Outlook Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td11\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">EU<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td12\">\n<p class=\"p7\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p5\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p6\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your\u00a0<a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\">Patch Management<\/span><\/a>\u00a0routines.<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out\u00a0<\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management?filter_products=all#filtered\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\"><b>this section of our blog<\/b><\/span><\/a><b>.<\/b>\u00a0<\/span><\/p>\n<p class=\"p6\"><em><span class=\"s1\">Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\">@cybersec_nerd<\/span><\/a><\/span><\/em><\/p>\n<p class=\"p9\"><em><span class=\"s9\">LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s10\">thesecuritypope<\/span><\/a><\/span><\/em><\/p>\n<p class=\"p9\"><em><span class=\"s9\">Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s10\">cybersec_nerd<\/span><\/a><\/span><\/em><\/p>\n<p class=\"p10\"><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p11\"><span class=\"s1\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Admins should beware as Microsoft uprates Exchange Server Elevation of Privilege vulnerability on day after release. Don\u2019t let this one slip under your radar, warns Lewis Pope.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-52375","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday February 2024: High Impact Exchange Vulnerability Uprated on Day After Release as Exploitation Detected - N-able<\/title>\n<meta name=\"description\" content=\"Admins beware! Exchange Server Elevation of Privilege vulnerability uprated on day after release of February 2024 Microsoft Patch Tuesday.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday February 2024: High Impact Exchange Vulnerability Uprated on Day After Release as Exploitation Detected - N-able\" \/>\n<meta property=\"og:description\" content=\"Admins beware! Exchange Server Elevation of Privilege vulnerability uprated on day after release of February 2024 Microsoft Patch Tuesday.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-15T11:06:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-04T14:59:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday February 2024: High Impact Exchange Vulnerability Uprated on Day After Release as Exploitation Detected\",\"datePublished\":\"2024-02-15T11:06:07+00:00\",\"dateModified\":\"2024-03-04T14:59:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024\"},\"wordCount\":939,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"articleSection\":[\"Head Nerds\",\"Patch Management\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024\",\"name\":\"Patch Tuesday February 2024: High Impact Exchange Vulnerability Uprated on Day After Release as Exploitation Detected - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"datePublished\":\"2024-02-15T11:06:07+00:00\",\"dateModified\":\"2024-03-04T14:59:57+00:00\",\"description\":\"Admins beware! Exchange Server Elevation of Privilege vulnerability uprated on day after release of February 2024 Microsoft Patch Tuesday.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday February 2024: High Impact Exchange Vulnerability Uprated on Day After Release as Exploitation Detected\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday February 2024: High Impact Exchange Vulnerability Uprated on Day After Release as Exploitation Detected - N-able","description":"Admins beware! Exchange Server Elevation of Privilege vulnerability uprated on day after release of February 2024 Microsoft Patch Tuesday.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024","og_locale":"de_DE","og_type":"article","og_title":"Patch Tuesday February 2024: High Impact Exchange Vulnerability Uprated on Day After Release as Exploitation Detected - N-able","og_description":"Admins beware! Exchange Server Elevation of Privilege vulnerability uprated on day after release of February 2024 Microsoft Patch Tuesday.","og_url":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-02-15T11:06:07+00:00","article_modified_time":"2024-03-04T14:59:57+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-01.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Lewis Pope","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday February 2024: High Impact Exchange Vulnerability Uprated on Day After Release as Exploitation Detected","datePublished":"2024-02-15T11:06:07+00:00","dateModified":"2024-03-04T14:59:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024"},"wordCount":939,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","articleSection":["Head Nerds","Patch Management"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024","url":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024","name":"Patch Tuesday February 2024: High Impact Exchange Vulnerability Uprated on Day After Release as Exploitation Detected - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","datePublished":"2024-02-15T11:06:07+00:00","dateModified":"2024-03-04T14:59:57+00:00","description":"Admins beware! Exchange Server Elevation of Privilege vulnerability uprated on day after release of February 2024 Microsoft Patch Tuesday.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2019\/08\/Horizons-Banner.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-february-2024#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de"},{"@type":"ListItem","position":2,"name":"Patch Tuesday February 2024: High Impact Exchange Vulnerability Uprated on Day After Release as Exploitation Detected"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/52375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=52375"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/52375\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=52375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}