CISA flags critical Microsoft SCCM flaw as exploited in attacks
嗯,用户让我总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得通读整篇文章,抓住主要内容。 文章讲的是CISA要求美国政府机构修复一个微软配置管理器的漏洞。这个漏洞是CVE-2024-43468,属于SQL注入类型,可以让无权限的攻击者执行高权限命令。微软在10月修补了这个漏洞,但后来被利用了。CISA现在要求在3月5日前修复,并提到这可能被广泛利用。 接下来,我需要把这些信息浓缩到100字以内。重点包括:CISA的命令、漏洞名称、影响、修复时间以及潜在风险。 可能会遗漏一些细节,比如微软最初对漏洞的评估和Synacktiv提供的概念验证代码。不过这些可能不是最关键的信息。 最后,确保语言简洁明了,直接描述内容。 </think> CISA要求美国政府机构修复Microsoft Configuration Manager中的SQL注入漏洞CVE-2024-43468,该漏洞允许无权限攻击者执行高权限命令。尽管微软于2024年10月修补了此漏洞,但近期被证实被积极利用。CISA敦促相关机构在2025年3月5日前完成修复以应对潜在威胁。 2026-2-13 12:45:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

Windows

CISA ordered U.S. government agencies on Thursday to secure their systems against a critical Microsoft Configuration Manager vulnerability patched in October 2024 and now exploited in attacks.

Microsoft Configuration Manager (also known as ConfigMgr and formerly System Center Configuration Manager, or SCCM) is an IT administration tool for managing large groups of Windows servers and workstations.

Tracked as CVE-2024-43468 and reported by offensive security company Synacktiv, this SQL injection vulnerability allows remote attackers with no privileges to gain code execution and run arbitrary commands with the highest level of privileges on the server and/or the underlying Microsoft Configuration Manager site database.

Wiz

"An unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target environment which are processed in an unsafe manner enabling the attacker to execute commands on the server and/or underlying database," Microsoft explained when it patched the flaw in October 2024.

At the time, Microsoft tagged it as "Exploitation Less Likely," saying that "an attacker would likely have difficulty creating the code, requiring expertise and/or sophisticated timing, and/or varied results when targeting the affected product."

However, Synacktiv shared proof-of-concept exploitation code for CVE-2024-43468 on November 26th, 2024, almost two months after Microsoft released security updates to mitigate this remote code execution vulnerability.

While Microsoft has not yet updated its advisory with additional information, CISA has now flagged CVE-2024-43468 as actively exploited in the wild and has ordered Federal Civilian Executive Branch (FCEB) agencies to patch their systems by March 5th, as mandated by the Binding Operational Directive (BOD) 22-01.

"These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise," the U.S. cybersecurity agency warned.

"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable."

Even though BOD 22-01 applies only to federal agencies, CISA encouraged all network defenders, including those in the private sector, to secure their devices against ongoing CVE-2024-43468 attacks as soon as possible.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/cisa-flags-microsoft-configmgr-rce-flaw-as-exploited-in-attacks/
如有侵权请联系:admin#unsafe.sh