{"id":54002,"date":"2024-04-18T17:19:36","date_gmt":"2024-04-18T16:19:36","guid":{"rendered":"https:\/\/www.n-able.com\/?p=54002"},"modified":"2024-05-16T18:20:10","modified_gmt":"2024-05-16T17:20:10","slug":"patch-tuesday-april-2024","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024","title":{"rendered":"Patch Tuesday April 2024: Lots of Fixes for Secure Boot and Remote Code Execution Vulnerabilities"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">The first Patch Tuesday of Spring brings the highest number of fixes for vulnerabilities in recent memory. System Admins and supporting teams will have a lot on their plates this month with the potential need to schedule in multiple reboots and additional mitigations to deal with Secure Boot vulnerabilities, and to contend with planning for impending end of support dates as well as changes in extended support for a range of Microsoft software and services.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Microsoft Vulnerabilities<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">April\u2019s Patch Tuesday brings fixes for 147 vulnerabilities with a handful of additional updates over the next few days to bring the total to 156 vulnerabilities being addressed this month as of writing. Only two are rated as Critical, 13 as Exploitation More Likely, and two designated as Zero-Day vulnerabilities.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">One of the notable trends in this month\u2019s collection of vulnerabilities is the number of Secure Boot vulnerabilities that are receiving fixes. Secure Boot has been a concern since late 2022, with the initial identification of the <a href=\"https:\/\/www.welivesecurity.com\/2023\/03\/01\/blacklotus-uefi-bootkit-myth-confirmed\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">BlackLotus UEFI Bootkit<\/span><\/a>. This rootkit allows malicious code to bypass the Secure Boot feature and load malware before the OS and other security tools have an opportunity to stop it. Rootkit style attacks lost popularity with threat actors when UEFI and Secure Boot became widely adopted. Now that there have been successful cyber threat campaigns run leveraging BlackLotus, this style of attack will likely continue\u2026 as they say, once the genie\u2019s out of the bottle!<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">There were 25 vulnerabilities addressed this month concerning Secure Boot Security Feature Bypass vulnerabilities. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24932\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2023-24931<\/span><\/a> received updates to include Windows 11 23H2 for ARM and x64 as being affected and addressed by updates. Per Microsoft release notes \u201cApril 24 security updates provide the latest mitigations. Note that these mitigations are off by default\u201d. Make sure to read Microsoft\u2019s guidance on additional steps needed to implement security mitigations <a href=\"https:\/\/support.microsoft.com\/help\/5025885\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932 &#8211; Microsoft Support<\/span><\/a>.<\/span><\/p>\n<p class=\"p2\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26234\" target=\"_blank\" rel=\"noopener\">CVE-2024-26234<\/a><\/span><span class=\"s1\"> is one of the zero-days of the month and is currently marked as under active exploitation. This Proxy Driver Spoofing vulnerability affects systems as far back as Windows Server 2008 and leverages a valid Microsoft Hardware Publisher Certificate sign a malicious executable. For a detailed write-up on its discovery see <a href=\"https:\/\/news.sophos.com\/en-us\/2024\/04\/09\/smoke-and-screen-mirrors-a-strange-signed-backdoor\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Sophos X-Ops report<\/span><\/a>.<\/span><\/p>\n<p class=\"p2\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-29988\" target=\"_blank\" rel=\"noopener\">CVE-2024-29988<\/a><\/span><span class=\"s1\"> is the second zero-day of the month and while it is only designated as exploitation more likely there are already reports that it is being <a href=\"https:\/\/www.zerodayinitiative.com\/blog\/2024\/4\/9\/the-april-2024-security-updates-review#:~:text=This%20is%20an%20odd%20one%2C%20as%20a%20ZDI%20threat%20researcher%20found%20this%20vulnerability%20being%20in%20the%20wild%2C%20although%20Microsoft%20currently%20doesn%E2%80%99t%20list%20this%20as%20exploited.\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">exploited in the wild<\/span><\/a>. This SmartScreen Prompt Security Bypass vulnerability allows the bypass to escape Mark of the Web and deliver payloads in zipped or archived files.<\/span><\/p>\n<h2 class=\"p4\">Microsoft Patch Tuesday Vulnerability Prioritization<\/h2>\n<p class=\"p5\">Addressing vulnerabilities effectively requires a mix of adhering to established best practices and leveraging informed judgment. While it\u2019s a natural instinct to rank vulnerabilities with critical severity ratings higher on the list of things that need to be addressed, relying on severity ratings alone can be limiting. An often-overlooked component is temporal metrics, which provide a measure of the window of vulnerability\u2014the time from initial vulnerability discovery to the availability and application of the patch. This is essential as the longer a vulnerability exists without a fix, the greater the potential for exploitation. By integrating temporal metrics into the risk evaluation process, organizations can gain a more comprehensive understanding of the threat landscape and potential attack vectors, ensuring that they don\u2019t leave themselves open to unnecessary risks.<\/p>\n<p class=\"p5\"><em>Table Key:\u00a0Severity:\u00a0C = Critical, I = Important, M = Moderate, R = Re-issue;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected,\u00a0EU = Exploitation Unlikely, N\/A = Not Available<\/em><\/p>\n<table cellspacing=\"0\" cellpadding=\"0\" class=\"t1\">\n<tbody>\n<tr>\n<td valign=\"top\" class=\"td1\" width=\"20%\">\n<p class=\"p5\"><span class=\"s1\"><b>CVE Number<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" width=\"60%\">\n<p class=\"p5\"><span class=\"s1\"><b>CVE Title<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td3\" width=\"10%\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\"><b>Severity<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td4\" width=\"10%\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\"><b>Status<\/b><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26234\" target=\"_blank\" rel=\"noopener\">CVE-2024-26234<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Proxy Driver Spoofing Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-24932\" target=\"_blank\" rel=\"noopener\">CVE-2023-24932<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Secure Boot Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-29053\" target=\"_blank\" rel=\"noopener\">CVE-2024-29053<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Defender for IoT Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21323\" target=\"_blank\" rel=\"noopener\">CVE-2024-21323<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Defender for IoT Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21322\" target=\"_blank\" rel=\"noopener\">CVE-2024-21322<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Defender for IoT Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-29056\" target=\"_blank\" rel=\"noopener\">CVE-2024-29056<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows Authentication Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26239\" target=\"_blank\" rel=\"noopener\">CVE-2024-26239<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows Telephony Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26230\" target=\"_blank\" rel=\"noopener\">CVE-2024-26230<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows Telephony Server Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26212\" target=\"_blank\" rel=\"noopener\">CVE-2024-26212<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">DHCP Server Service Denial of Service Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26211\" target=\"_blank\" rel=\"noopener\">CVE-2024-26211<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows Remote Access Connection Manager Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26241\" target=\"_blank\" rel=\"noopener\">CVE-2024-26241<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Win32k Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26218\" target=\"_blank\" rel=\"noopener\">CVE-2024-26218<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26209\" target=\"_blank\" rel=\"noopener\">CVE-2024-26209<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-29988\" target=\"_blank\" rel=\"noopener\">CVE-2024-29988<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">SmartScreen Prompt Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-28903\" target=\"_blank\" rel=\"noopener\">CVE-2024-28903<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Secure Boot Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-28921\" target=\"_blank\" rel=\"noopener\">CVE-2024-28921<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Secure Boot Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26158\" target=\"_blank\" rel=\"noopener\">CVE-2024-26158<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">Microsoft Install Service Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p6\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26256\" target=\"_blank\" rel=\"noopener\">CVE-2024-26256<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p5\"><span class=\"s1\">libarchive Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p5\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p3\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p5\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your\u00a0Patch Management\u00a0routines.<\/p>\n<p class=\"p5\"><strong>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out\u00a0the <a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\">Patch Management section of our blog<\/a>.<\/strong><\/p>\n<p class=\"p5\"><em>Lewis Pope is the Head Security Nerd at N\u2011able. You can follow him on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\">@cybersec_nerd<\/a><\/em><\/p>\n<p class=\"p5\"><em>LinkedIn:\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\">thesecuritypope<\/a><\/em><\/p>\n<p class=\"p5\"><em>Twitch:\u00a0<a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\">cybersec_nerd<\/a><span class=\"s1\">\u00a0<\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>April\u2019s Microsoft Patch Tuesday brings a bumper crop of fixes that will be keeping patching teams busy this month! Lewis Pope takes a look under the hood.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-54002","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday April 2024: Lots of Fixes for Secure Boot and Remote Code Execution Vulnerabilities - N-able<\/title>\n<meta name=\"description\" content=\"April\u2019s Microsoft Patch Tuesday brings a bumper crop of fixes that will be keeping patching teams busy! Lewis Pope takes a look under the hood.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday April 2024: Lots of Fixes for Secure Boot and Remote Code Execution Vulnerabilities - N-able\" \/>\n<meta property=\"og:description\" content=\"April\u2019s Microsoft Patch Tuesday brings a bumper crop of fixes that will be keeping patching teams busy! Lewis Pope takes a look under the hood.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-18T16:19:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T17:20:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-02.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2501\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday April 2024: Lots of Fixes for Secure Boot and Remote Code Execution Vulnerabilities\",\"datePublished\":\"2024-04-18T17:19:36+01:00\",\"dateModified\":\"2024-05-16T17:20:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024\"},\"wordCount\":908,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024\",\"name\":\"Patch Tuesday April 2024: Lots of Fixes for Secure Boot and Remote Code Execution Vulnerabilities - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2024-04-18T17:19:36+01:00\",\"dateModified\":\"2024-05-16T17:20:10+00:00\",\"description\":\"April\u2019s Microsoft Patch Tuesday brings a bumper crop of fixes that will be keeping patching teams busy! Lewis Pope takes a look under the hood.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/head-nerds-fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday April 2024: Lots of Fixes for Secure Boot and Remote Code Execution Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday April 2024: Lots of Fixes for Secure Boot and Remote Code Execution Vulnerabilities - N-able","description":"April\u2019s Microsoft Patch Tuesday brings a bumper crop of fixes that will be keeping patching teams busy! Lewis Pope takes a look under the hood.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024","og_locale":"fr_FR","og_type":"article","og_title":"Patch Tuesday April 2024: Lots of Fixes for Secure Boot and Remote Code Execution Vulnerabilities - N-able","og_description":"April\u2019s Microsoft Patch Tuesday brings a bumper crop of fixes that will be keeping patching teams busy! Lewis Pope takes a look under the hood.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-04-18T16:19:36+00:00","article_modified_time":"2024-05-16T17:20:10+00:00","og_image":[{"width":2501,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-02.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Lewis Pope","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday April 2024: Lots of Fixes for Secure Boot and Remote Code Execution Vulnerabilities","datePublished":"2024-04-18T17:19:36+01:00","dateModified":"2024-05-16T17:20:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024"},"wordCount":908,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024","url":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024","name":"Patch Tuesday April 2024: Lots of Fixes for Secure Boot and Remote Code Execution Vulnerabilities - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2024-04-18T17:19:36+01:00","dateModified":"2024-05-16T17:20:10+00:00","description":"April\u2019s Microsoft Patch Tuesday brings a bumper crop of fixes that will be keeping patching teams busy! Lewis Pope takes a look under the hood.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-april-2024#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/head-nerds-fr"},{"@type":"ListItem","position":2,"name":"Patch Tuesday April 2024: Lots of Fixes for Secure Boot and Remote Code Execution Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/54002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=54002"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/54002\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=54002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}