{"id":4089,"date":"2024-12-19T10:25:14","date_gmt":"2024-12-19T15:25:14","guid":{"rendered":"https:\/\/cert.pa\/?p=4089"},"modified":"2024-12-19T10:25:17","modified_gmt":"2024-12-19T15:25:17","slug":"csirt-panama-aviso-2024-dic-19-actualizaciones-de-seguridad-de-microsoft-para-diciembre-2024","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=4089","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2024-dic-19 Actualizaciones de seguridad de Microsoft para Diciembre 2024."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2024-dic-19 Actualizaciones de seguridad de Microsoft para Diciembre 2024.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: diciembre 19, 2024<br>\u00daltima revisi\u00f3n: diciembre 18, 2024<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Dec<\/p>\n\n\n\n<p>Sistemas Afectados:<br>System Center Operations Manager<br>Microsoft Office<br>Microsoft Edge (Chromium-based)<br>Microsoft Defender for Endpoint<br>Microsoft Office SharePoint<br>GitHub<br>Microsoft Office Word<br>Microsoft Office Excel<br>Windows Defender<br>Windows Task Scheduler<br>Windows Mobile Broadband<br>Windows Kernel-Mode Drivers<br>Windows Remote Desktop Services<br>Windows Virtualization-Based Security (VBS) Enclave<br>Microsoft Office Publisher<br>Windows IP Routing Management Snapin<br>Windows Wireless Wide Area Network Service<br>Windows File Explorer<br>Windows Kernel<br>Windows Routing and Remote Access Service (RRAS)<br>Windows Common Log File System Driver<br>Role: DNS Server<br>Windows Resilient File System (ReFS)<br>Windows PrintWorkflowUserSvc<br>Windows Message Queuing<br>Remote Desktop Client<br>WmsRepair Service<br>Windows LDAP &#8211; Lightweight Directory Access Protocol<br>Windows Cloud Files Mini Filter Driver<br>Role: Windows Hyper-V<br>Windows Local Security Authority Subsystem Service (LSASS)<br>Windows Remote Desktop<br>Microsoft Office Access<br>Microsoft Update Catalog<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de diciembre de 2024.<br>Este conjunto de actualizaciones remedia 71 fallas y 1 dia cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>GitHub<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49063\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49063<\/a><\/td><td>Microsoft\/Muzic Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Defender for Endpoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49057\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49057<\/a><\/td><td>Microsoft Defender for Endpoint on Android Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-12053\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-12053<\/a><\/td><td>Chromium: CVE-2024-12053 Type Confusion in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49041\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49041<\/a><\/td><td>Microsoft Edge (Chromium-based) Spoofing Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/ADV240002\" rel=\"noreferrer noopener\" target=\"_blank\">ADV240002<\/a><\/td><td>Microsoft Office Defense in Depth Update<\/td><td>Moderate<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49059\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49059<\/a><\/td><td>Microsoft Office Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43600\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43600<\/a><\/td><td>Microsoft Office Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Access<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49142\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49142<\/a><\/td><td>Microsoft Access Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49069\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49069<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Publisher<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49079\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49079<\/a><\/td><td>Input Method Editor (IME) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49064\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49064<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49062\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49062<\/a><\/td><td>Microsoft SharePoint Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49068\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49068<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49070\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49070<\/a><\/td><td>Microsoft SharePoint Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Word<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49065\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49065<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: DNS Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49091\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49091<\/a><\/td><td>Windows Domain Name Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49117\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49117<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>System Center Operations Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43594\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43594<\/a><\/td><td>System Center Operations Manager Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cloud Files Mini Filter Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49114\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49114<\/a><\/td><td>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49088\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49088<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49138\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49138<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49090\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49090<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows File Explorer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49082\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49082<\/a><\/td><td>Windows File Explorer Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows IP Routing Management Snapin<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49080\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49080<\/a><\/td><td>Windows IP Routing Management Snapin Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49084\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49084<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel-Mode Drivers<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49074\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49074<\/a><\/td><td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49121\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49121<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49124\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49124<\/a><\/td><td>Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49112\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49112<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49113\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49113<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows LDAP &#8211; Lightweight Directory Access Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49127\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49127<\/a><\/td><td>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Local Security Authority Subsystem Service (LSASS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49126\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49126<\/a><\/td><td>Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49118\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49118<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49122\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49122<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Message Queuing<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49096\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49096<\/a><\/td><td>Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49073\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49073<\/a><\/td><td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49077\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49077<\/a><\/td><td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49083\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49083<\/a><\/td><td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49092\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49092<\/a><\/td><td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49087\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49087<\/a><\/td><td>Windows Mobile Broadband Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49110\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49110<\/a><\/td><td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49078\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49078<\/a><\/td><td>Windows Mobile Broadband Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows PrintWorkflowUserSvc<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49095\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49095<\/a><\/td><td>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows PrintWorkflowUserSvc<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49097\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49097<\/a><\/td><td>Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49132\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49132<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49115\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49115<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49116\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49116<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49123\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49123<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49129\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49129<\/a><\/td><td>Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49075\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49075<\/a><\/td><td>Windows Remote Desktop Services Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49128\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49128<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49106\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49106<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49108\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49108<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49119\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49119<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49120\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49120<\/a><\/td><td>Windows Remote Desktop Services Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Resilient File System (ReFS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49093\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49093<\/a><\/td><td>Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49085\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49085<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49086\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49086<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49089\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49089<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49125\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49125<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49104\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49104<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49102\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49102<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Task Scheduler<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49072\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49072<\/a><\/td><td>Windows Task Scheduler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Virtualization-Based Security (VBS) Enclave<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49076\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49076<\/a><\/td><td>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Wide Area Network Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49081\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49081<\/a><\/td><td>Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Wide Area Network Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49103\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49103<\/a><\/td><td>Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Wide Area Network Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49111\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49111<\/a><\/td><td>Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Wide Area Network Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49109\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49109<\/a><\/td><td>Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Wide Area Network Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49101\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49101<\/a><\/td><td>Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Wide Area Network Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49094\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49094<\/a><\/td><td>Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Wide Area Network Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49098\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49098<\/a><\/td><td>Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Wireless Wide Area Network Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49099\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49099<\/a><\/td><td>Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>WmsRepair Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-49107\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-49107<\/a><\/td><td>WmsRepair Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2024-dic-19 Actualizaciones de seguridad de Microsoft para Diciembre 2024.Gravedad: AltaFecha de publicaci\u00f3n: diciembre 19, 2024\u00daltima revisi\u00f3n: diciembre 18, 2024https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Dec Sistemas Afectados:System Center Operations ManagerMicrosoft OfficeMicrosoft Edge (Chromium-based)Microsoft Defender for EndpointMicrosoft Office SharePointGitHubMicrosoft&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,80,68,45,94],"class_list":["post-4089","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4089"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4089\/revisions"}],"predecessor-version":[{"id":4090,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/4089\/revisions\/4090"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}