opinion
Aug 16, 202410 mins
MicrosoftMicrosoft OfficeWindows Security
Microsoft’s monthly update for August includes fixes for six — yes, six — zero-day flaws affecting Windows and Office.Microsoft pushed out 90 updates this week in its August Patch Tuesday release, including fixes for five Windows zero-days (CVE-2024-38178, CVE-2024-38193, CVE-2024-38213, CVE-2024-38106, CVE-2024-38107) and one zero-day affecting Office (CVE-2024-38189).
Unfortunately, this means a “Patch Now” recommendation for both Windows and Microsoft Office this month. Microsoft offered several (pretty useful) mitigations and recommendations to reduce the impact of these security issues; our testing guidance reflects this, with a focus on the networking related features of Windows.
Minor updates for the Microsoft development platforms can be added to your standard patch release schedule, while Microsoft did not release any patches for Microsoft SQL Server or Exchange Server. And Adobe Reader updates are back, though we assume this will be included in your Windows desktop Patch Now release cycle.
The team at Readiness has provided a helpful infographic that outlines the risks associated with each of these updates. (See our running list of recent Patch Tuesday updates here.)
Known issuesEach month, Microsoft publishes a list of known issues affecting the operating system and platforms included in the latest update cycle, including these two reported minor issues:
This Patch Tuesday saw the following major revisions to past Microsoft security and feature updates, including:
Microsoft published the following vulnerability-related mitigations for this month’s release cycle:
Each month, the team at Readiness analyses the latest updates and provides detailed, actionable testing guidance based on a large application portfolio and a detailed analysis of the patches and their potential impact on Windows and app installations. We have grouped the critical updates and required testing efforts into separate product and functional areas, including:
Microsoft OfficeDue to the changes to Microsoft Outlook and .NET components, we recommend a full test of sending/receiving mails with HTML content.
Microsoft .NET and developer toolsMicrosoft updated both Microsoft .NET (Version 8) and Visual Studio 2022 with the following testing recommendations
With the release of the Windows updates, Microsoft put a real focus on securing Windows networking features with updates to core system files such as AFD.SYS; these will require the following testing:
In addition to these networking-focused changes, Microsoft updated core features in the Windows desktop and server platforms, including:
Microsoft made a number of significant changes to the Windows file system (NTFS) with changes to both the NtQueryEaFile and NtSetEaFile APIs. Unfortunately, a significant testing cycle is required that should include large file CRUD file tests — and remember to include a query component. The Readiness team suggests that a PowerShell test be included to assist with “pacing” rapid changes to the Windows file system.
Given recent challenges with CrowdStrike and BitLocker, Microsoft published changes that will require testing of the Microsoft BitLocker recovery environment.
Windows lifecycle update (now including enforcements)This section contains important changes to servicing, significant feature deprecations and security-related enforcements across the Windows desktop and server platforms.
Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:
Browsers
Microsoft released 11 updates to the Edge browser platform. These low-profile changes have been rated as either important or moderate, reflecting their lower security and deployment risks. We recommend following the stable channel release of Microsoft Edge, as there will be mid-cycle releases at the end of this month. Add these browser updates to your standard release schedule.
Given the larger (and somewhat concerning) number of exploited and publicly disclosed vulnerabilities this month, we again recommend a “Patch Now” schedule for this update.
Microsoft OfficeMicrosoft returns to form with one critical rated update to Copilot (CVE-2024-38206) and nine other updates to the Microsoft Office suite, all rated important. Unfortunately, one of the vulnerabilities (CVE-2024-38189) that affects the entire Office platform has been reported as exploited. Add Microsoft Office to the Patch Now release schedule.
Microsoft SQL (nee Exchange) ServerGood news: no updates or patches for either SQL Server or Exchange Server.
Microsoft development platformsMicrosoft released four low-profile updates to the Microsoft .NET and Visual Studio 2022 platforms. We do not expect serious testing requirements for these lesser reported vulnerabilities. Add these updates to your standard developer release schedule.
Adobe Reader (and other third-party updates)Adobe Reader is back in the game with an important update, APSB24-57, which has addressed 12 memory and “use after free” (my favorite) security vulnerabilities; it can be added to your Windows update cycle.
SUBSCRIBE TO OUR NEWSLETTER
From our editors straight to your inboxGet started by entering your email address below.
Greg Lambert is an evangelist for Application Readiness, the online assessment and application conversion specialists. Greg is a co-founder of ChangeBASE, and now CEO of Application Readiness, and has considerable experience with application packaging technology and its deployment.
More from this authorMay 16, 2025 7 mins
Apr 11, 2025 11 mins
Mar 14, 2025 8 mins
Feb 14, 2025 8 mins
Jan 20, 2025 9 mins
Dec 13, 2024 8 mins
Nov 15, 2024 9 mins
Oct 11, 2024 9 mins
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4