{"id":53243,"date":"2024-03-25T11:27:19","date_gmt":"2024-03-25T11:27:19","guid":{"rendered":"https:\/\/www.n-able.com\/?p=53243"},"modified":"2024-03-25T11:27:19","modified_gmt":"2024-03-25T11:27:19","slug":"patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability","title":{"rendered":"Patch Tuesday March 2024: Two Low-Impact Zero Days and a Third High Impact Exchange Vulnerability"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">Lower number of patches and no zero-days means no panicked patching of Windows vulnerabilities this Patch Tuesday. The lower total number of vulnerabilities should make it an easy month to catch up on patching as there were some complications with an update that highlights the need to have alternative options in place to push patches to systems.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Microsoft Vulnerabilities<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">Microsoft addressed 60 vulnerabilities this month, only two marked critical and seven as Exploitation More Likely. The two critical vulnerabilities are for Windows Hyper-V on multiple Windows Server versions from 2012 to 2022, Windows 10, and Windows 11. This wide footprint of affected systems and one of the critical vulnerabilities\u2014<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21407\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE2024-21407<\/span><\/a>\u2014being a remote execution vulnerability that can escape the guest VM and run remote code on the host server, should make this a priority item to patch this month.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">When Normal Patch Routines Fail<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">This month did bring some complications with <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/march-12-2024-kb5035849-os-build-17763-5576-719f5f8d-51c6-43f0-a612-1c15802fed06\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5035849<\/span><\/a> for Windows Server 2019 and Windows 10. Their were early reports on Patch Tuesday of Windows Server 2019 updates failing with <a href=\"https:\/\/www.reddit.com\/r\/sysadmin\/comments\/1bcp2ql\/comment\/kujpgpf\/?utm_source=share&amp;utm_medium=web2x&amp;context=3\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Error 0xd0000034<\/span><\/a>, with the suggested workaround being to manually download and install the update from the Windows Update catalog. There was also a known issue with this particular update that caused a memory leak with Local Security Authority Subsystem Service (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Local_Security_Authority_Subsystem_Service\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">LSASS<\/span><\/a>) that had not yet been addressed by Microsoft at the time of writing (10 days later). This may cause situations where LSASS crashes, causing a reboot of a domain controller.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">The fact that the workaround was a manual install from the Windows Update catalog does highlight the need to have pre-planned and scalable ways of applying emergency patches when your normal method is not available. If you don\u2019t have a way of currently handling a situation where your primary way of applying a patch isn\u2019t available, it\u2019s worth having a look at how you can deal with this scenario. Our <a href=\"https:\/\/www.n-able.com\/automation-cookbook\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Automation Cookbook<\/span><\/a> has one potential PowerShell script that can help you deal with this scenario\u2026 <a href=\"https:\/\/me.n-able.com\/s\/article\/Install-Windows-Updates-via-WUSA\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Click here to find out more and download the script<\/span><\/a>.<\/span><\/p>\n<h2 class=\"p4\">Microsoft Patch Tuesday Vulnerability Prioritization<\/h2>\n<p class=\"p5\">Addressing vulnerabilities effectively requires a mix of adhering to established best practices and leveraging informed judgment. While it\u2019s a natural instinct to rank vulnerabilities with critical severity ratings higher on the list of things that need to be addressed, relying on severity ratings alone can be limiting. An often-overlooked component is temporal metrics, which provide a measure of the window of vulnerability\u2014the time from initial vulnerability discovery to the availability and application of the patch. This is essential as the longer a vulnerability exists without a fix, the greater the potential for exploitation. By integrating temporal metrics into the risk evaluation process, organizations can gain a more comprehensive understanding of the threat landscape and potential attack vectors, ensuring that they don\u2019t leave themselves open to unnecessary risks.<\/p>\n<p class=\"p5\"><em>Table Key:\u00a0Severity:\u00a0C = Critical, I = Important, M = Moderate, R = Re-issue;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected,\u00a0EU = Exploitation Unlikely, N\/A = Not Available<\/em><\/p>\n<table cellspacing=\"0\" cellpadding=\"0\" class=\"t1\">\n<tbody>\n<tr>\n<td valign=\"top\" class=\"td1\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\"><b>CVE Number<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" width=\"60%\">\n<p class=\"p5\"><span class=\"s1\"><b>CVE Title<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td3\" width=\"10%\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\"><b>Severity<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td4\" width=\"20%\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\"><b>Status<\/b><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21410\" target=\"_blank\" rel=\"noopener\">CVE-2024-21410<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Exchange Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21412\" target=\"_blank\" rel=\"noopener\">CVE-2024-21412<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Internet Shortcut Files Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43890\" target=\"_blank\" rel=\"noopener\">CVE-2021-43890<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows AppX Installer Spoofing Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21351\" target=\"_blank\" rel=\"noopener\">CVE-2024-21351<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows SmartScreen Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">M<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21380\" target=\"_blank\" rel=\"noopener\">CVE-2024-21380<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Dynamics Business Central\/NAV Information Disclosure Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-20684\" target=\"_blank\" rel=\"noopener\">CVE-2024-20684<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows Hyper-V Denial of Service Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21357\" target=\"_blank\" rel=\"noopener\">CVE-2024-21357<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21379\" target=\"_blank\" rel=\"noopener\">CVE-2024-21379<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Word Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21378\" target=\"_blank\" rel=\"noopener\">CVE-2024-21378<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Outlook Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21371\" target=\"_blank\" rel=\"noopener\">CVE-2024-21371<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21346\" target=\"_blank\" rel=\"noopener\">CVE-2024-21346<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\" style=\"text-align: left;\"><span class=\"s1\">Win32k Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\" style=\"text-align: center;\">\n<p class=\"p5\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21345\" target=\"_blank\" rel=\"noopener\">CVE-2024-21345<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21338\" target=\"_blank\" rel=\"noopener\">CVE-2024-21338<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td9\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21413\" target=\"_blank\" rel=\"noopener\">CVE-2024-21413<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td10\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Outlook Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td11\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EU<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td12\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p2\">Summary<\/h2>\n<p class=\"p5\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your\u00a0Patch Management\u00a0routines.<\/p>\n<p class=\"p5\">Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out\u00a0this section of our blog.<\/p>\n<p class=\"p6\"><em><span class=\"s1\">Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s8\">@cybersec_nerd<\/span><\/a><\/span><\/em><\/p>\n<p class=\"p9\"><em><span class=\"s9\">LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s10\">thesecuritypope<\/span><\/a><\/span><\/em><\/p>\n<p class=\"p9\"><em><span class=\"s9\">Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s10\">cybersec_nerd<\/span><\/a><\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A lower number of patches in March, but complications with an update highlights need to have alternative options in place to push patches. Lewis Pope explores the details.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-53243","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday March 2024: Two Low-Impact Zero Days and a Third High Impact Exchange Vulnerability - N-able<\/title>\n<meta name=\"description\" content=\"March Patch Tuesday has fewer patches, but complications with an update highlights need to have alternative options in place to push patches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday March 2024: Two Low-Impact Zero Days and a Third High Impact Exchange Vulnerability - N-able\" \/>\n<meta property=\"og:description\" content=\"March Patch Tuesday has fewer patches, but complications with an update highlights need to have alternative options in place to push patches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-25T11:27:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday March 2024: Two Low-Impact Zero Days and a Third High Impact Exchange Vulnerability\",\"datePublished\":\"2024-03-25T11:27:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability\"},\"wordCount\":760,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability\",\"name\":\"Patch Tuesday March 2024: Two Low-Impact Zero Days and a Third High Impact Exchange Vulnerability - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2024-03-25T11:27:19+00:00\",\"description\":\"March Patch Tuesday has fewer patches, but complications with an update highlights need to have alternative options in place to push patches.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday March 2024: Two Low-Impact Zero Days and a Third High Impact Exchange Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday March 2024: Two Low-Impact Zero Days and a Third High Impact Exchange Vulnerability - N-able","description":"March Patch Tuesday has fewer patches, but complications with an update highlights need to have alternative options in place to push patches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability","og_locale":"de_DE","og_type":"article","og_title":"Patch Tuesday March 2024: Two Low-Impact Zero Days and a Third High Impact Exchange Vulnerability - N-able","og_description":"March Patch Tuesday has fewer patches, but complications with an update highlights need to have alternative options in place to push patches.","og_url":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-03-25T11:27:19+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Lewis Pope","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday March 2024: Two Low-Impact Zero Days and a Third High Impact Exchange Vulnerability","datePublished":"2024-03-25T11:27:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability"},"wordCount":760,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability","url":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability","name":"Patch Tuesday March 2024: Two Low-Impact Zero Days and a Third High Impact Exchange Vulnerability - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2024-03-25T11:27:19+00:00","description":"March Patch Tuesday has fewer patches, but complications with an update highlights need to have alternative options in place to push patches.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/patch-tuesday-march-2024-two-low-impact-zero-days-and-a-third-high-impact-exchange-vulnerability#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de"},{"@type":"ListItem","position":2,"name":"Patch Tuesday March 2024: Two Low-Impact Zero Days and a Third High Impact Exchange Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/53243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=53243"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/53243\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=53243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}