{"id":54567,"date":"2024-05-16T18:22:17","date_gmt":"2024-05-16T17:22:17","guid":{"rendered":"https:\/\/www.n-able.com\/?p=54567"},"modified":"2024-05-16T18:22:17","modified_gmt":"2024-05-16T17:22:17","slug":"patch-tuesday-may-2024","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024","title":{"rendered":"Patch Tuesday May 2024: Important Fix for Exploit Used by Qakbot"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">It may have fewer total fixes for vulnerabilities than last month, but May\u2019s Patch Tuesday still addresses some important zero-day vulnerabilities\u2014one of which has been under exploitation by multiple threat actors since at least April. With three vulnerabilities known to be in use by threat actors, and one that has been publicly disclosed there is still some urgency this month to pushing updates even though the number of severity ratings are comparatively low against the previous few months.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Microsoft Vulnerabilities<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">May\u2019s Patch Tuesday brings fixes for a total of 61 vulnerabilities, with informational changes to five vulnerabilities. Only one vulnerability is rated as Critical, 11 as Exploitation More Likely and three designated as zero-day vulnerabilities. Two of the zero-days being under Active Exploitation and one being publicly disclosed, but marked as Exploitation Less Likely.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Included in this month\u2019s Patch Tuesday release notes from Microsoft are Chromium-based Edge browser vulnerabilities. While Edge browser vulnerabilities are commonly addressed by Chromium updates that happen outside of the Microsoft\u2019s Patch Tuesday window, the addition of the vulnerabilities into the release notes does bring up the topic of needing to be familiar with how and when the Microsoft Edge browser is updated.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">The big vulnerability fix of the month is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-30051\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2024-30051<\/span><\/a> that addresses a Windows Desktop Window Manager (DWM) exploit that would allow an attacker to gain system privileges as part of an elevation attack. Being an attack that requires no user interaction beyond opening a file, the threshold for attackers leveraging the vulnerability is rather low and it has already been used to <a href=\"https:\/\/securelist.com\/cve-2024-30051\/112618\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">deliver Qakbot<\/span><\/a> and other malware payloads. It also affects multiple Windows 10 and Windows 11 builds as well as Windows Server 2016 and up.<\/span><\/p>\n<p class=\"p2\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-30040\" target=\"_blank\" rel=\"noopener\">CVE-2024-30040<\/a><\/span><span class=\"s1\"> is another zero-day vulnerability Under Active Exploitation that targets Windows MSHTML platform, which is used to render browser-based content and finds itself being relied upon by multiple Window components including Office 365 and Microsoft Office applications. Information on this vulnerability is sparse so as of print it is unknown how or where the vulnerability has been abused. It allows for execution of arbitrary code in the context of the current Windows user simply by opening a malicious document. Chaining this vulnerability with another vulnerability that allows for privilege escalation could result in compromise of a system. As this vulnerability is Under Active Exploitation and scores a CVSS of 8.8, it along with CVE-2024-30051 should be plenty of motivation to patch systems as soon as possible.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">The final Microsoft zero-day of May is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30046\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2024-30046<\/span><\/a> affecting Visual Studio 2022, .NET 8.0 and .NET 7.0. This denial of service vulnerability only carries a CVSS of 5.9 and is marked as being publicly disclosed but Not Under Active Exploitation. This is a great example of how only focusing on zero-days because they sound more dangerous can make you less resilient against other threats that might fly under your radar, even though they are actively being exploited.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">The only critical vulnerability of the month from Microsoft is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30044\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2024-30044<\/span><\/a> affecting Microsoft SharePoint Server 2016, 2019 and Subscription Edition. The small footprint of SharePoint on premise servers means it\u2019s unlikely many will need to be concerned with addressing this vulnerability but the critical rating and being marked as Exploitation More Likely does mean those who are running on-premise SharePoint will need to have another priority item to patch.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Microsoft Patch Tuesday Vulnerability Prioritization<\/span><\/h2>\n<p class=\"p5\"><span class=\"s1\">Addressing vulnerabilities effectively requires a mix of adhering to established best practices and leveraging informed judgment. While it\u2019s a natural instinct to rank vulnerabilities with critical severity ratings higher on the list of things that need to be addressed, relying on severity ratings alone can be limiting. An often-overlooked component is temporal metrics, which provide a measure of the window of vulnerability\u2014the time from initial vulnerability discovery to the availability and application of the patch. This is essential as the longer a vulnerability exists without a fix, the greater the potential for exploitation. By integrating temporal metrics into the risk evaluation process, organizations can gain a more comprehensive understanding of the threat landscape and potential attack vectors, ensuring that they don\u2019t leave themselves open to unnecessary risks.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Table Key:\u00a0Severity:\u00a0C = Critical, I = Important, M = Moderate, R = Re-issue;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected,\u00a0EU = Exploitation Unlikely, N\/A = Not Available<\/i><\/span><\/p>\n<table cellspacing=\"0\" cellpadding=\"0\" class=\"t1\">\n<tbody>\n<tr>\n<td valign=\"top\" class=\"td1\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\"><b>CVE Number<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" width=\"60%\">\n<p class=\"p6\"><span class=\"s1\"><b>CVE Title<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td3\" width=\"10%\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\"><b>Severity<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td4\" width=\"10%\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\"><b>Exploitability<\/b><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30051\" target=\"_blank\" rel=\"noopener\">CVE-2024-30051<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows DWM Core Library Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30040\" target=\"_blank\" rel=\"noopener\">CVE-2024-30040<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows MSHTML Platform Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30049\" target=\"_blank\" rel=\"noopener\">CVE-2024-30049<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30038\" target=\"_blank\" rel=\"noopener\">CVE-2024-30038<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Win32k Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30037\" target=\"_blank\" rel=\"noopener\">CVE-2024-30037<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30035\" target=\"_blank\" rel=\"noopener\">CVE-2024-30035<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows DWM Core Library Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30034\" target=\"_blank\" rel=\"noopener\">CVE-2024-30034<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30032\" target=\"_blank\" rel=\"noopener\">CVE-2024-30032<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows DWM Core Library Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30025\" target=\"_blank\" rel=\"noopener\">CVE-2024-30025<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30050\" target=\"_blank\" rel=\"noopener\">CVE-2024-30050<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Mark of the Web Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">M<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-30044\" target=\"_blank\" rel=\"noopener\">CVE-2024-30044<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-29996\" target=\"_blank\" rel=\"noopener\">CVE-2024-29996<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td9\">\n<p class=\"p7\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-26211\" target=\"_blank\" rel=\"noopener\">CVE-2024-26211<\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td10\">\n<p class=\"p6\"><span class=\"s1\">Windows Remote Access Connection Manager Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td11\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td12\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p4\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p5\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your\u00a0Patch Management\u00a0routines.<\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><b>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out\u00a0the <\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><b>Patch Management section of our blog<\/b><\/span><\/a><b>.<\/b><\/span><\/p>\n<p class=\"p5\"><span class=\"s1\"><i>Lewis Pope is the Head Security Nerd at N\u2011able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p8\"><span class=\"s6\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p8\"><span class=\"s6\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>cybersec_nerd<\/i><\/span><\/a><i>\u00a0<\/i><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>May\u2019s Microsoft Patch Tuesday addresses 61 vulnerabilities, with known to be in use by threat actors. Lewis Pope investigates.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-54567","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday May 2024: Important Fix for Exploit Used by Qakbot - N-able<\/title>\n<meta name=\"description\" content=\"May\u2019s Microsoft Patch Tuesday addresses 61 vulnerabilities, with known to be in use by threat actors. Lewis Pope investigates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday May 2024: Important Fix for Exploit Used by Qakbot - N-able\" \/>\n<meta property=\"og:description\" content=\"May\u2019s Microsoft Patch Tuesday addresses 61 vulnerabilities, with known to be in use by threat actors. Lewis Pope investigates.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-16T17:22:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday May 2024: Important Fix for Exploit Used by Qakbot\",\"datePublished\":\"2024-05-16T18:22:17+01:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024\"},\"wordCount\":993,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024\",\"name\":\"Patch Tuesday May 2024: Important Fix for Exploit Used by Qakbot - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2024-05-16T18:22:17+01:00\",\"description\":\"May\u2019s Microsoft Patch Tuesday addresses 61 vulnerabilities, with known to be in use by threat actors. Lewis Pope investigates.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/head-nerds-fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday May 2024: Important Fix for Exploit Used by Qakbot\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday May 2024: Important Fix for Exploit Used by Qakbot - N-able","description":"May\u2019s Microsoft Patch Tuesday addresses 61 vulnerabilities, with known to be in use by threat actors. Lewis Pope investigates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024","og_locale":"fr_FR","og_type":"article","og_title":"Patch Tuesday May 2024: Important Fix for Exploit Used by Qakbot - N-able","og_description":"May\u2019s Microsoft Patch Tuesday addresses 61 vulnerabilities, with known to be in use by threat actors. Lewis Pope investigates.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-05-16T17:22:17+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Lewis Pope","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday May 2024: Important Fix for Exploit Used by Qakbot","datePublished":"2024-05-16T18:22:17+01:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024"},"wordCount":993,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024","url":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024","name":"Patch Tuesday May 2024: Important Fix for Exploit Used by Qakbot - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2024-05-16T18:22:17+01:00","description":"May\u2019s Microsoft Patch Tuesday addresses 61 vulnerabilities, with known to be in use by threat actors. Lewis Pope investigates.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/patch-tuesday-may-2024#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/head-nerds-fr"},{"@type":"ListItem","position":2,"name":"Patch Tuesday May 2024: Important Fix for Exploit Used by Qakbot"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/54567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=54567"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/54567\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=54567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}